The availability and security of many services we rely upon including water treatment, electricity, healthcare, transportation, and financial transactions are routinely put at risk by cyber threats. The Handbook of SCADA/Control Systems Security is a fundamental outline of security concepts, methodologies, and relevant information pertaining to the
Table of Contents:
Social Implications and Impacts. Introduction. Sociological and Cultural Aspects. Threat Vectors. Risk Management. Governance and Management. Disaster Recovery and Business Continuity of SCADA. Incident Response and SCADA. Forensics Management. Governance and Compliance. Architecture and Modeling. Communications and Engineering Systems. Metrics Framework for a SCADA System. Network Topology and Implementation. Commissioning and Operations. Obsolescence and Procurement of SCADA. Patching and Change Management. Physical Security Management. Tabletop/Red-Blue Exercises. Integrity Monitoring. Data Management and Records Retention. Conclusion and References. The Future of SCADA and Control Systems Security. Appendix A Listing of Online Resources SCADA/Control Systems. Appendix B Terms and Definitions. Index.
About the Author :
Robert Radvanovsky is an active professional in the United States with knowledge in security, risk management, business continuity, disaster recovery planning, and remediation. He has significantly contributed to establishing several certification programs, specifically on the topics of "critical infrastructure protection" and "critical infrastructure assurance." He has published a number of articles and white papers regarding this topic. Significantly involved in establishing security training and awareness programs through his company, his extracurricular activities also include working several professional accreditation and educational institutions, specifically on the topics of homeland security, critical infrastructure protection and assurance, and cyber security.
Jacob Brodsky has worked on every aspect of SCADA and control systems for Washington Suburban Sanitary Commission (WSSC) from the assembly language firmware of the RTU, to the communications protocols, the telecommunications networks, the data networks, systems programming, protocol drivers, HMI design, and PLC programming. In 2012, he was elected chairman of the DNP User group. Jake has contributed to the NIST SP 800-82 effort and to the ISA-99 effort. He is a registered professional engineer of control systems in the state of Maryland.
Review :
I wish that each SCADA developer read this book while developing the software, as the focus on functionality is remarkable in this collection. It explains in an easy way what happens when ‘there are some security and reliability issues around’ and what should be remembered so that it does not appear again. Every aspect is well described with clear examples.
—IEEE Communications Magazine
After Stuxnet, everything has changed in the automation industry. Computer worms devastating power plants and many other sites reminded people managing industrial control systems (ICS) that they are equally as vulnerable as standard IT systems. The book edited by Radvanovsky and Brodsky provides, in a collection of various contributions, a thorough guide on how to design supervisory control and data acquisition (SCADA) systems to prevent most security hazards, what to take into consideration while implementing various methods of authentication, and how to prepare and respond efficiently in case of ICS faults.
The book consists of five sections divided into eighteen compact chapters describing all the aspects of risks and assets related to designing and maintaining ICS. ... In short, it is a guidebook on good (automated) security practice. I wish that each SCADA developer read this book while developing the software, as the focus on functionality is remarkable in this collection. It explains in an easy way what happens when ‘there are some security and reliability issues around’ and what should be remembered so that it does not appear again.—Robert Wojcik writing in IEEE Communications Magazine, May 2014