000 03314nmm a22003377a 4500
003 OSt
005 20240814173815.0
008 240814b |||||||| |||| 00| 0 eng d
020 _a9781643311555 (e-book)
040 _cCavite State University - Main Campus Library
_erda
041 _aeng
050 _aTJ222
_bM97 2023
100 _aMustard, Steve
_948092
_eauthor
245 _aIndustrial cybersecurity :
_bcase studies and best practices /
_cby Steve Mustard
260 _a USA :
_bInternational Society of Automation,
_c2023
300 _a1 online resource (275, pages) :
_bcolor illustrations.
336 _2rdacontent
_atext
337 _2rdamedia
_acomputer
338 _2rdacarrier
_aonline resource
500 _ahttps://portal.igpublish.com/iglibrary/ is required to read this e-book.
504 _aIncludes index
505 _a1: Introduction -- 2. What makes industrial cybersecurity different? -- 3. Creating effective policy -- 4. Measure to manage risk -- 5. Standardized design and vendor certification -- 6. Pitfalls of project delivery -- 7. What we can learn from the safety culture -- 8. Safeguarding operational support -- 9. People, poetry, and next steps
520 _aThis book provides a practical overview of industrial control systems cybersecurity from governance through design and implementation to operational support. It is for anyone involved in industrial control systems cybersecurity, including asset owners, vendors, system integrators, and consultants, regardless of their level of technical expertise. The term industrial control systems is very broad and, in this context, includes any system that is used to monitor or control physical equipment such as building control systems (e.g., heating, ventilation, and air conditioning systems), water treatment plant supervisory control and data acquisition (SCADA) systems, oil and gas distributed control systems (DCSs), and safety instrumented systems (SISs). The author explains each phase of the process of designing, implementing, and maintaining a successful cybersecurity system, as well as the underlying issues that must be addressed. He emphasizes that the key to success is support and participation from everyone—just like successful safety programs. Topics include: The differences between IT cybersecurity and industrial cybersecurity Creating effective policy for cybersecurity management How to manage cybersecurity risk through measurement Standardized design and vendor certification The pitfalls in managing cybersecurity during project delivery What we can learn from the safety culture Safeguarding operational support
541 _aFund 164
_bCE-Logic
_cPurchased
_dFebruary 19, 2024
_eOEBP000459
_fP. Roderno
_hPHP 11,970.00
_p2024-02-0124
_q2024-1-113
650 0 _aMechanical engineering and machinery
_948098
650 0 _a Control engineering systems.
_948099
650 0 _aAutomatic machinery (General)
_948100
856 _uhttps://portal.igpublish.com/iglibrary/obj/ISAB0000146?searchid=1720076857891IwK6RQM0eghxSD64qh8ph
_yClick here to read Full-Text E-Book
856 _uhttps://docs.google.com/forms/d/e/1FAIpQLSfSoAj3qM4b_ttQMZLuimqgwkfHDH1NyJ7S4eyjHD7Vr4j7EQ/viewform
_yLog-in to the website is required to read this e-book. Click here to request access.
942 _2lcc
_cOEB
999 _c64513
_d64513