Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
34Activity

Table Of Contents

History of Critical Infrastructure Directives
SCADA Evolution
SCADA Definition
SCADA System Architecture
SCADA Applications
SCADA System Security Issues Overview
SCADA and IT Convergence
Conventional IT Security and Relevant SCADA Issues
Redundancy as a Component of SCADA Security
SCADA System Desirable Properties
Summary
Employment of SCADA Systems
Petroleum Refining
The Basic Refining Process
Possible Attack Consequences
Nuclear Power Generation
The Boiling Water Reactor
The Pressurized Water Reactor
Conventional Electric Power Generation
Petroleum Wellhead Pump Control
Water Purification System
Crane Control
SCADA in the Corporation
Chemical Plant
Benzene Production
Embedded Systems
Why We Should Worry about These Operations
Evolution of SCADA Protocols
Background Technologies of the SCADA Protocols
Overview of the OSI Model
Overview of the TCP/IP Model
SCADA Protocols
The MODBUS Model
The DNP3 Protocol
UCA 2.0 and IEC61850 Standards
Controller Area Network
Control and Information Protocol
DeviceNet
ControlNet
EtherNet/IP
Profibus
The Security Implications of the SCADA Protocols
Firewalls
Packet-Filtering Firewalls
Stateful Inspection Firewalls
Proxy Firewalls
Demilitarized Zone
Single Firewall DMZ
Dual Firewall DMZ
General Firewall Rules for Different Services
Virtual Private Networks
The Myth of SCADA Invulnerability
SCADA Risk Components
Managing Risk
Risk Management Components
Assessing the Risk
Mitigating the Risk
SCADA Threats and Attack Routes
Threats
SCADA Attack Routes
Typical Attacker Privilege Goals
SCADA Honeynet Project
Honeypots
Honeynet Project
SCADA Honeynet
SCADA Security Mechanisms
Improving Cybersecurity of SCADA Networks
Implementing Security Improvements
SCADA Intrusion Detection Systems
Types of Intrusion Detection Systems
Network-Based and Host-Based IDS
Signature-Based and Anomaly-Based IDS
Active-Response IDS
Passive-Response IDS
Processing of IDS Data
Vulnerability Scanning and Analysis
SCADA Audit Logs
Security Awareness
ISO/IEC 17799:2005 and BS 7799-2:2002
ISO/IEC 1779:2005
BS 7799-2:2002
Additional Useful NIST Special Publications
Management Impressions of SCADA Security
SCADA Culture
Unique Characteristics and Requirements ofSCADA Systems
Implement System Security
Common Criteria Protection Profiles
Defense-in-Depth
Defense-in-Depth Strategy
The Status Today
Human Issues
Weakness of Standard Security Approaches
The Oil and Gas Industry
API Standard 1164
AGA Report Number 12
Interdependencies
Rail System Security
Port Security
Legislation
Threats to Seaports
Countermeasures
Conventional Countermeasures
Security Controls That Can Be Put in Place Now
0 of .
Results for:
No results containing your search query
P. 1
Securing SCADA Systems

Securing SCADA Systems

Ratings: (0)|Views: 1,774 |Likes:
Published by rakeshlondon

More info:

Published by: rakeshlondon on Jul 14, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

08/07/2013

pdf

text

original

You're Reading a Free Preview
Pages 5 to 147 are not shown in this preview.
You're Reading a Free Preview
Page 152 is not shown in this preview.
You're Reading a Free Preview
Pages 157 to 171 are not shown in this preview.
You're Reading a Free Preview
Pages 179 to 240 are not shown in this preview.

Activity (34)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
kysu2tung liked this
scbaik_167634421 liked this
sayedmh liked this
Naeemrind liked this
electric_wizard liked this
Danilo De Pauli liked this
ismail_tarek7904 liked this
Ajay Wadkar liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->