File Size: 10470 KB
Print Length: 422 pages
Page Numbers Source ISBN: 0124201148
Publisher: Syngress; 2 edition (December 9, 2014)
Publication Date: December 9, 2014
Sold by: Digital Services LLC
Language: English
ASIN: B00R4DX6BG
Text-to-Speech: Enabled
X-Ray: Not Enabled
Word Wise: Not Enabled
Lending: Not Enabled
Enhanced Typesetting: Not Enabled
Best Sellers Rank: #418,376 Paid in Kindle Store (See Top 100 Paid in Kindle Store) #34 in Books > Computers & Technology > Hardware & DIY > Microprocessors & System Design > Control Systems #247 in Books > Computers & Technology > Networking & Cloud Computing > Network Administration > Storage & Retrieval #296 in Kindle Store > Kindle eBooks > Computers & Technology > Software > Business
First off a touch of background on the reviewer. I've been an automation professional for about 15 years working in industries ranging from big chemical to pharmaceuticals all the way from DCS's to tiny systems with 20 I/O and two screen HMI. I've worked for both operating companies and integrators. I was excited when I saw the title of the book because I expected a balanced look at real world solutions for very real problems. There is a serious issue right now in our industry with a number of people spreading FUD about how we are all doomed because our protocols are insecure and vendors don't practice proper SDL. While the facts they speak of are true, I think a more balanced approach of highlighting the deficiencies and then immediately providing actionable information an end user can take away is more appropriate. This happens to be almost the exact flow of this book. You can see the table of contents for yourself but the authors do an excellent job of giving the reader some basis for understanding the material through a history lesson and also an introduction to basic concepts in ICS network design. Next they raise the stakes by describing the insecure protocols with a culmination discussing how you might hack these protocols. The information revealed is certainly not earth shattering and is probably Hacking 102 or 103 for someone once they learn the protocols. Where this text truly succeeds, however, is taking you from a fearful place in chapter 7 and walking you through real world tasks you can execute to safeguard your systems. Again, I won't repeat what you can see in the TOC but the authors do a magnificent job of taking you through the logical steps of assessing risk, compartmentalizing the risk, and then monitoring for undesirable activity on your network.
Industrial Network Security, Second Edition: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems (Advances in Information Security) Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions Living Off The Grid And Loving It: 40 Creative Ways To Living A Stress Free And Self-Sustaining Lifestyle (Simple Living, Off Grid Living, Off The Grid Homes, DIY Survival Guide, Prepping & Survival) Grid Down: How To Prepare For Surviving A Gas, Water, Or Electricity Grid Collapse (EMP Survival, Emergency Preparedness, Off The Grid, SHTF Stockpile, ... Camping, SHTF Books, SHTF Preparedness) Defensive Security Handbook: Best Practices for Securing Infrastructure Home Security: Top 10 Home Security Strategies to Protect Your House and Family Against Criminals and Break-ins (home security monitor, home security system diy, secure home network) Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS Hacking SCADA/Industrial Control Systems: The Pentest Guide Smart Grid Infrastructure & Networking Access Control, Authentication, And Public Key Infrastructure (Jones & Bartlett Learning Information Systems Security) Access Control, Authentication, And Public Key Infrastructure (Information Systems Security & Assurance) An Approach to Vulnerability Assessment for Navy Supervisory Control and Data Acquisition (SCADA) Systems An Architectural Framework for Describing Supervisory Control and Data Acquisition (SCADA) Systems Homeland Security and Private Sector Business: Corporations' Role in Critical Infrastructure Protection Extending Simple Network Management Protocol (SNMP) Beyond Network Management: A MIB Architecture for Network-Centric Services Power System SCADA and Smart Grids Design of Smart Power Grid Renewable Energy Systems Network Security Assessment: Know Your Network