000 | 03314nmm a22003377a 4500 | ||
---|---|---|---|
003 | OSt | ||
005 | 20240814173815.0 | ||
008 | 240814b |||||||| |||| 00| 0 eng d | ||
020 | _a9781643311555 (e-book) | ||
040 |
_cCavite State University - Main Campus Library _erda |
||
041 | _aeng | ||
050 |
_aTJ222 _bM97 2023 |
||
100 |
_aMustard, Steve _948092 _eauthor |
||
245 |
_aIndustrial cybersecurity : _bcase studies and best practices / _cby Steve Mustard |
||
260 |
_a USA : _bInternational Society of Automation, _c2023 |
||
300 |
_a1 online resource (275, pages) : _bcolor illustrations. |
||
336 |
_2rdacontent _atext |
||
337 |
_2rdamedia _acomputer |
||
338 |
_2rdacarrier _aonline resource |
||
500 | _ahttps://portal.igpublish.com/iglibrary/ is required to read this e-book. | ||
504 | _aIncludes index | ||
505 | _a1: Introduction -- 2. What makes industrial cybersecurity different? -- 3. Creating effective policy -- 4. Measure to manage risk -- 5. Standardized design and vendor certification -- 6. Pitfalls of project delivery -- 7. What we can learn from the safety culture -- 8. Safeguarding operational support -- 9. People, poetry, and next steps | ||
520 | _aThis book provides a practical overview of industrial control systems cybersecurity from governance through design and implementation to operational support. It is for anyone involved in industrial control systems cybersecurity, including asset owners, vendors, system integrators, and consultants, regardless of their level of technical expertise. The term industrial control systems is very broad and, in this context, includes any system that is used to monitor or control physical equipment such as building control systems (e.g., heating, ventilation, and air conditioning systems), water treatment plant supervisory control and data acquisition (SCADA) systems, oil and gas distributed control systems (DCSs), and safety instrumented systems (SISs). The author explains each phase of the process of designing, implementing, and maintaining a successful cybersecurity system, as well as the underlying issues that must be addressed. He emphasizes that the key to success is support and participation from everyone—just like successful safety programs. Topics include: The differences between IT cybersecurity and industrial cybersecurity Creating effective policy for cybersecurity management How to manage cybersecurity risk through measurement Standardized design and vendor certification The pitfalls in managing cybersecurity during project delivery What we can learn from the safety culture Safeguarding operational support | ||
541 |
_aFund 164 _bCE-Logic _cPurchased _dFebruary 19, 2024 _eOEBP000459 _fP. Roderno _hPHP 11,970.00 _p2024-02-0124 _q2024-1-113 |
||
650 | 0 |
_aMechanical engineering and machinery _948098 |
|
650 | 0 |
_a Control engineering systems. _948099 |
|
650 | 0 |
_aAutomatic machinery (General) _948100 |
|
856 |
_uhttps://portal.igpublish.com/iglibrary/obj/ISAB0000146?searchid=1720076857891IwK6RQM0eghxSD64qh8ph _yClick here to read Full-Text E-Book |
||
856 |
_uhttps://docs.google.com/forms/d/e/1FAIpQLSfSoAj3qM4b_ttQMZLuimqgwkfHDH1NyJ7S4eyjHD7Vr4j7EQ/viewform _yLog-in to the website is required to read this e-book. Click here to request access. |
||
942 |
_2lcc _cOEB |
||
999 |
_c64513 _d64513 |