Industrial Control Systems Security and Resiliency: Practice and Theory
Rieger, Craig, Ray, Indrajit, Zhu, Quanyan
- 出版商: Springer
- 出版日期: 2020-10-30
- 售價: $6,540
- 貴賓價: 9.5 折 $6,213
- 語言: 英文
- 頁數: 276
- 裝訂: Quality Paper - also called trade paper
- ISBN: 3030182169
- ISBN-13: 9783030182168
-
相關分類:
控制系統 Control-systems、資訊安全
海外代購書籍(需單獨結帳)
相關主題
商品描述
This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios.
Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Such resilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission's survivability goals, and identify ways to design secure resilient ICS systems.
This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source.
Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Such resilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission's survivability goals, and identify ways to design secure resilient ICS systems.
This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source.
作者簡介
Craig Rieger is the Chief Control Systems Research Engineer at the Idaho National Laboratory (INL), pioneering multidisciplinary research in the area of next generation resilient control systems. In addition, he has organized and chaired nine Institute of Electrical and Electronics Engineers (IEEE) technically co-sponsored symposia and one National Science Foundation workshop in this new research area, and authored more than 40 peer-reviewed publications. He received his PhD in Engineering and Applied Science from Idaho State University in 2008. He is a senior member of IEEE, and has 20 years of software and hardware design experience for process control system upgrades and new installations. He has also been a supervisor and technical lead for control systems engineering groups having design, configuration management, and security responsibilities for several INL nuclear facilities and various control system architectures.
Indrajit Ray is a Professor at the Computer Science Department at Colorado State University. He received his PhD in Information Technology from George Mason University in Fairfax, VA in 1997. His main research interests are in the areas of data and application security, network security, security modeling, risk management, trust models, privacy and digital forensics. He is a member of the Data and Applications Security Group, the Network Security Group, and the Software Assurance Laboratory at Colorado State University. His research has been funded by the U.S. National Science Foundation, the Air Force Office of Scientific Research, the Air Force Research Laboratory and the Federal Aviation Administration. He is a member of IEEE Computer Society, ACM, ACM Special Interest Group on Security Audit and Control, IFIP WG 11.3 on Data and Applications Security and IFIP WG 11.9 on Digital Forensics.
Quanyan Zhu is an Assistant Professor at the Department of Electrical and Computer Engineering at the Polytechnic School of Engineering at the New York University, NY, USA. He received his PhD in Electrical and Computer Engineering from the University of Illinois at Urbana-Champaign in 2013. His main research interests are in the areas of Game Theory and Applications, Resilient and Secure Socio-Cyber-Physical Systems, Adversarial Machine Learning and Signal Processing, Human-Robot Interactions, Internet of Things, Game and Decision Theory for Cyber Security, Economics and Optimization of Infrastructure Systems, and Resource Allocations in Communication Networks.
Michael Haney is an Assistant Professor of Computer Science for the University of Idaho and a cybersecurity researcher for the Idaho National Laboratory. He received his master's and doctorate in computer science from the University of Tulsa in 2013 and 2015, respectively. Currently, his research interests are in data visualization, specifically visualizing network and system log data to improve intrusion detection and response for large-scale networks. He studies cyber-security issues of energy assurance supporting a more resilient "smart" infrastructure. His focus here lies in honeypot research -- creating systems that mimic real power generation systems, oil refineries or water treatment plants, and recording and studying the cyber-attacks against these systems.
Indrajit Ray is a Professor at the Computer Science Department at Colorado State University. He received his PhD in Information Technology from George Mason University in Fairfax, VA in 1997. His main research interests are in the areas of data and application security, network security, security modeling, risk management, trust models, privacy and digital forensics. He is a member of the Data and Applications Security Group, the Network Security Group, and the Software Assurance Laboratory at Colorado State University. His research has been funded by the U.S. National Science Foundation, the Air Force Office of Scientific Research, the Air Force Research Laboratory and the Federal Aviation Administration. He is a member of IEEE Computer Society, ACM, ACM Special Interest Group on Security Audit and Control, IFIP WG 11.3 on Data and Applications Security and IFIP WG 11.9 on Digital Forensics.
Quanyan Zhu is an Assistant Professor at the Department of Electrical and Computer Engineering at the Polytechnic School of Engineering at the New York University, NY, USA. He received his PhD in Electrical and Computer Engineering from the University of Illinois at Urbana-Champaign in 2013. His main research interests are in the areas of Game Theory and Applications, Resilient and Secure Socio-Cyber-Physical Systems, Adversarial Machine Learning and Signal Processing, Human-Robot Interactions, Internet of Things, Game and Decision Theory for Cyber Security, Economics and Optimization of Infrastructure Systems, and Resource Allocations in Communication Networks.
Michael Haney is an Assistant Professor of Computer Science for the University of Idaho and a cybersecurity researcher for the Idaho National Laboratory. He received his master's and doctorate in computer science from the University of Tulsa in 2013 and 2015, respectively. Currently, his research interests are in data visualization, specifically visualizing network and system log data to improve intrusion detection and response for large-scale networks. He studies cyber-security issues of energy assurance supporting a more resilient "smart" infrastructure. His focus here lies in honeypot research -- creating systems that mimic real power generation systems, oil refineries or water treatment plants, and recording and studying the cyber-attacks against these systems.