Security PHA Review for Consequence-Based Cybersecurity
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Science, Technology & Agriculture > Technology: general issues > Engineering: general > Security PHA Review for Consequence-Based Cybersecurity
Security PHA Review for Consequence-Based Cybersecurity

Security PHA Review for Consequence-Based Cybersecurity


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Security PHA Review for Consequence-Based Cybersecurity presents a practical, process-centric method that uses existing process hazard analysis (PHA) outputs, such as hazard and operability (HAZOP) studies, to determine appropriate cybersecurity requirements for industrial process plants. The objective of the security PHA review (SPR) is to identify process hazard scenarios that could be caused by malicious cyber actions and then either recommend non‑hackable safeguards to remove the cyber vector or assign an appropriate ISA/IEC 62443 security level (SL) to guide cybersecurity design and implementation. This approach emphasizes assessing initiating events, reviewing all safeguards (both cyber and non‑cyber) and evaluating consequences in the context of an organization's risk tolerance criteria.

This book explains how SLs apply to security zones and how conduits inherit the highest SL among connected zones and situates SPR within the ISA/IEC 62443 lifecycle. It emphasizes a process‑hazard perspective rather than equipment‑only vulnerability listings, describes practical documentation methods (highlighter annotations, dedicated SPR reports or PHA‑software integration) and highlights common non‑hackable safeguards (such as mechanical relief devices, buckling pins, motor overload relays and external current monitors) that can reduce required SLs when feasible.

Written so that process engineers, control systems professionals, IT professionals and cybersecurity specialists can learn to integrate IT security with process-safety practices without unnecessary duplication of effort. It provides practical, implementable methods, centered on the SPR approach, to identify cyber-enabled process hazards and to assess and reduce risk in real industrial settings.



Table of Contents:

Foreword ix
Preface xi
About the Authors xiii

Chapter 1 Introduction 1
Brief History of Cyberattacks on ICSs 3
Security Level 5
Zones and Conduits 6
Risk Analysis Methods for Cybersecurity 7
The Security PHA Review Study 9
Benefits of the SPR Study 11
Objectives of this Book 12
Summary 14
Exercises 15
Bibliography 16

Chapter 2 Overview of the ISA/IEC 62443 Series 19
Structure of the ISA/IEC 62443 Series 19
The ISA/IEC 62443 Series Life Cycle and Requirements 21
Requirements for Risk Analysis 23
Summary 23
Exercises 24
Bibliography 24

Chapter 3 Limitations of Cybersecurity Risk Analysis Methods 25
The ISA/IEC 62443 Series Requirements for Risk Assessment 26
Risk Assessment Methods Promulgated by the Cybersecurity Community 28
Cyber PHA/Cyber HAZOP 29
CHAZOP 31
Inherent Problems with Existing Cyber Risk Analysis 31
Lack of Initiating Event 32
Infinite Potential Outcomes 33
Inherent Safety Against Cyberattack Is Not Considered 33
Frequency of Deliberate Attack 34
Summary 34
Exercises 35
Bibliography 37

Chapter 4 Process Hazard Analysis Overview 39
Common PHA Methods 41
Hazards and Operability Studies 43
Process Safety Information 45
Node Definition 45
HAZOP Team 46
Deviation Development 47
Building the Scenario 48
Summary 52
Exercises 53
Bibliography 55

Chapter 5 The SPR Study Process 57
Documenting a SPR 59
The Highlighter Method 59
The SPR Report Document 65
Leveraging PHA Documentation Software 65
Advanced Methods 66
Summary 67
Exercises 67
Bibliography 69

Chapter 6 Non-Hackable Safeguards 71
Pressure Relief Devices 71
Direct-Operated Relief Valve 72
Rupture Discs 72
Buckling Pins 73
Mechanical Overspeed Trips 74Check Valves 74
Non-Return Check Valves 75
Excess Flow Check Valves 76
Motor-Monitoring Devices 76
Motor Overload Relays 77Motor-Current Monitor Relay 77
Instrument-Loop Current Monitor Relay 77Summary 79
Exercises 79
Bibliography 81

Chapter 7 Security PHA Review Examples 83
Vessel Overpressure 84
Thermal Runaway Reaction 86
Pump-Blocked Discharge 92
Tank Reactor Runaway Reaction 94
Summary 98
Exercises 98
Bibliography 99

Chapter 8 Conclusions 101

Appendix A: Acronyms 105
Appendix B: Definitions 109
Appendix C: Sample Risk Tolerance Criteria 111
Appendix D: ISA/IEC 62443 Security Levels 117
Appendix E: Exercise Solutions 139

Index 147



About the Author :

Edward M. Marszal, Professional Engineer (PE) and ISA84 Safety Instrumented Systems Expert, is the president and chief executive officer of Kenexis. Kenexis is an engineering consultancy dedicated to assisting process industry customers with assessing the risks that are posed by their plant operations and then reducing those risks to a tolerable level by the specification of instrumented safeguards, such as safety instrumented systems (SISs), fire and gas systems (FGSs), critical alarm systems, and cybersecurity. Marszal is a longtime practitioner and pioneer of the techniques and tools associated with technical safety and the performance-based design and implementation of instrumented safeguards.
Marszal started his career after receiving a BA in chemical engineering, with an emphasis on process controls and artificial intelligence, from The Ohio State University. After graduating, Marszal took a position with UOP in Des Plaines, Illinois where he worked as an instrumentation and control field advisor, performing functional safety assessments of control systems and safety instrumented systems at customer sites worldwide. At UOP, he designed and managed the development of custom control systems and SIS projects.

James McGlone is the chief marketing officer of Kenexis. McGlone has more than 30 years of experience in the development and deployment of many of the embedded control systems used in industrial automation, building automation, Internet of Things (IoT), and cybersecurity.
McGlone started his career in the US Navy as an electronics technician and nuclear reactor operator on fast attack submarines. McGlone was on the pre-commissioning crew of two submarines during construction and shakedown, eventually taking the boats to sea as operational platforms. While in the Navy, McGlone acquired computers and began programming in various languages including BASIC, COBOL, and FORTRAN. After 9 years of maintaining and operating nuclear power plants in submarines, McGlone decided to pursue a civilian career as a technical specialist for a Rockwell Automation (Allen-Bradley) distributor in Akron, Ohio where he solved challenging applications for drives and motion control systems and learned to program programmable logic controllers (PLCs).


Best Sellers


Product Details
  • ISBN-13: 9781643311173
  • Publisher: Instrument Society of America
  • Publisher Imprint: Instrument Society of America
  • ISBN-10: 1643311174
  • Publisher Date: 20 Apr 2026


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Security PHA Review for Consequence-Based Cybersecurity
Instrument Society of America -
Security PHA Review for Consequence-Based Cybersecurity
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Security PHA Review for Consequence-Based Cybersecurity

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!