Industrial Control Systems Security and Resiliency Practice and Theory /

This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Rieger, Craig (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Ray, Indrajit (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Zhu, Quanyan (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Haney, Michael A. (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2019.
Έκδοση:1st ed. 2019.
Σειρά:Advances in Information Security, 75
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 04312nam a2200565 4500
001 978-3-030-18214-4
003 DE-He213
005 20191025011728.0
007 cr nn 008mamaa
008 190829s2019 gw | s |||| 0|eng d
020 |a 9783030182144  |9 978-3-030-18214-4 
024 7 |a 10.1007/978-3-030-18214-4  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Industrial Control Systems Security and Resiliency  |h [electronic resource] :  |b Practice and Theory /  |c edited by Craig Rieger, Indrajit Ray, Quanyan Zhu, Michael A. Haney. 
250 |a 1st ed. 2019. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2019. 
300 |a X, 276 p. 98 illus., 81 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Advances in Information Security,  |x 1568-2633 ;  |v 75 
505 0 |a 1. Current and New Practice -- 2. Cyber-Modeling, Detection, and Forensics -- 3. Proactive Defense Mechanism Design -- 4. Human System Interface -- 5. Metrics For Resilience. 
520 |a This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios. Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Such resilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission's survivability goals, and identify ways to design secure resilient ICS systems. This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source. 
650 0 |a Data protection. 
650 0 |a Computer communication systems. 
650 0 |a Electrical engineering. 
650 0 |a Artificial intelligence. 
650 1 4 |a Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28000 
650 2 4 |a Computer Communication Networks.  |0 http://scigraph.springernature.com/things/product-market-codes/I13022 
650 2 4 |a Communications Engineering, Networks.  |0 http://scigraph.springernature.com/things/product-market-codes/T24035 
650 2 4 |a Artificial Intelligence.  |0 http://scigraph.springernature.com/things/product-market-codes/I21000 
700 1 |a Rieger, Craig.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Ray, Indrajit.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Zhu, Quanyan.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Haney, Michael A.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783030182137 
776 0 8 |i Printed edition:  |z 9783030182151 
776 0 8 |i Printed edition:  |z 9783030182168 
830 0 |a Advances in Information Security,  |x 1568-2633 ;  |v 75 
856 4 0 |u https://doi.org/10.1007/978-3-030-18214-4  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)