Industrial network security securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems

As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems-energy production, water, gas, and other vital systems-becomes more important, and heavily mandated. Industrial Network Security, Third Edition arms you with the knowledge you need to unders...

Descripción completa

Detalles Bibliográficos
Autor principal: Knapp, Eric D. (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: San Diego : Elsevier Science & Technology Books 2024.
Edición:Third edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009835405306719
Tabla de Contenidos:
  • Front Cover
  • Industrial Network Security
  • Industrial Network Security
  • Copyright
  • Contents
  • Biography
  • Acknowledgments
  • 1 - Introduction
  • Book overview and key learning points
  • Book audience
  • Diagrams and figures
  • The smart grid
  • OT, IoT, IIoT, and xIoT
  • How this book is organized
  • Chapter 2: About Industrial Networks
  • Chapter 3: Industrial Cyber Security, History, and Trends
  • Chapter 4: Introduction to ICS Systems and Operations
  • Chapter 5: ICS Network Design and Architecture
  • Chapter 6: Industrial Network Protocols
  • Chapter 7: Hacking Industrial Systems
  • Chapter 8: Risk and Vulnerability Assessments
  • Chapter 9: Establishing Zones and Conduits
  • Chapter 10: OT Attack and Defense Lifecycles
  • Chapter 11: Implementing Security and Access Controls
  • Chapter 12: Exception, Anomaly, and Threat Detection
  • Chapter 13: Security Monitoring of Industrial Control Systems
  • Chapter 14: Standards and Regulations
  • Chapter 15: Common Pitfalls and Mistakes
  • Changes made to the third edition
  • Conclusion
  • 2 - About Industrial Networks
  • The use of terminology within this book
  • Attacks, breaches and incidents
  • malware, exploits, and APTs
  • Assets, critical assets, cyberassets, and critical cyberassets
  • Security controls and security countermeasures
  • Firewalls and intrusion prevention systems
  • Industrial control system
  • Building control systems
  • DCS or SCADA?
  • Plants, mills, refineries, and lines
  • Industrial networks
  • Industrial protocols
  • Networks, routable networks and non-routable networks
  • Enterprise or business networks
  • Zones and enclaves
  • Network perimeters or "electronic security perimeters"
  • Critical infrastructure
  • Utilities
  • Nuclear facilities
  • Bulk electric
  • Smart grid
  • Chemical facilities
  • Understanding "OT" versus "IT".
  • Common Industrial Security Recommendations
  • Identification of critical systems
  • Network segmentation/isolation of systems
  • Defense in depth
  • Access control
  • Advanced Industrial Security Recommendations
  • Security Monitoring
  • Policy whitelisting
  • Application whitelisting
  • Common Misperceptions About Industrial Network Security
  • Assumptions made in this book
  • Summary
  • 3 - Industrial Cybersecurity History and Trends
  • The convergence of OT and IT
  • Importance of securing industrial networks
  • The evolution of the cyber threat
  • APTs and weaponized malware
  • Industroyer
  • Night dragon
  • Stuxnet
  • TRISIS
  • Advanced persistent threats and cyber warfare
  • Still to come
  • Defending against modern cyber threats
  • The insider
  • Hacktivism, cybercrime, cyberterrorism, and cyberwar
  • Summary
  • 4 - Introduction to Industrial Control Systems and Operations
  • System assets
  • Programmable logic controller
  • Ladder diagrams
  • Sequential function charts
  • Remote terminal unit
  • Intelligent electronic device
  • Human-machine interface
  • Supervisory workstations
  • Data historian
  • Business information consoles and dashboards
  • Other assets
  • System operations
  • Control loops
  • Control processes
  • Feedback loops
  • Production information management
  • Business information management
  • Process management
  • Safety instrumented systems
  • The smart grid
  • Network architectures
  • Summary
  • 5 - Industrial Network Design and Architecture
  • Introduction to industrial networking
  • Common topologies
  • Network segmentation
  • Higher layer segmentation
  • Physical versus logical segmentation
  • Microsegmentation
  • Cryptographic microsegmentation
  • Network services
  • Wireless networks
  • Remote access
  • Performance considerations
  • Latency and jitter
  • Bandwidth and throughput.
  • Type of service, class of service, and quality of service
  • Network hops
  • Network security controls
  • Safety instrumented systems
  • Special considerations
  • Wide area connectivity
  • Smart grid network considerations
  • Advanced metering infrastructure
  • Summary
  • 6 - Industrial Network Protocols
  • Overview of industrial network protocols
  • Fieldbus protocols
  • Modicon communication bus (Modbus)
  • What it does
  • How it works
  • Variants
  • Modbus RTU and Modbus ASCII
  • Modbus TCP
  • Modbus plus or Modbus+
  • Where it is used
  • Security concerns
  • Security recommendations
  • Distributed network protocol (DNP3)
  • What it does
  • How it works
  • Secure DNP3
  • Where it is used
  • Security concerns
  • Security recommendations
  • Process fieldbus (PROFIBUS)
  • Security concerns
  • Security recommendations
  • Industrial ethernet protocols
  • Ethernet industrial protocol (EtherNet/IP)
  • Security concerns
  • Security recommendations
  • PROFINET
  • Security concerns
  • Security recommendations
  • EtherCAT
  • Security concerns
  • Security recommendations
  • Ethernet POWERLINK
  • Security concerns
  • Security recommendations
  • SERCOS III
  • Security concerns
  • Security recommendations
  • Backend protocols
  • Object linking and embedding for process control
  • What it does
  • How it works
  • Where it is used
  • Security concerns
  • Security recommendations
  • Intercontrol center communications protocol (ICCP/IEC 60870-6 TASE.2)
  • What it does
  • How it works
  • Where it is used
  • Security concerns
  • Security improvements over Modbus
  • Security recommendations
  • IEC 61850, 60870-5-101, and 60870-5-104
  • How they work
  • 60870-5-101 and 60870-5-104
  • IEC 61850
  • Security concerns
  • Security recommendations
  • AMI and the smart grid
  • Security concerns
  • Security recommendations
  • Industrial protocol simulators
  • Modbus/TCP
  • DNP3.
  • OPC
  • ICCP/TASE.2
  • Physical hardware
  • Summary
  • 7 - Hacking Industrial Control Systems
  • Motives and consequences
  • Consequences of a successful cyberincident
  • Cybersecurity and safety
  • Common industrial targets
  • The evolution of the industrial cyberattack
  • Common attack methods
  • Attack phases
  • Initial attack phases
  • Industrial attack phases
  • Cyber-physical attacks
  • Rogue access devices
  • Keylogging/keystroke injections/HID attacks
  • Man-in-the-middle attacks
  • Denial-of-service attacks
  • Replay attacks
  • Compromising the human-machine interface
  • Compromising the engineering workstation
  • Blended attacks
  • Weaponized industrial cyberthreats
  • Stuxnet
  • Dissecting stuxnet
  • What it does
  • Lessons learned
  • Shamoon/DistTrack
  • Flame/flamer/skywiper
  • Dragonfly
  • BlackEnergy
  • Industroyer
  • TRISIS/TRITON
  • Industroyer2
  • Incontroller/pipedream
  • Attack trends
  • Evolving vectors
  • Supply chain vulnerabilities
  • Adobe Portable Document Format
  • Macros
  • Secure sockets layers
  • Log4j
  • Ransomware and industrial control systems
  • Industrial application layer protocols
  • Antisocial networks: A new playground for malware
  • Polymorphic and adaptive malware
  • Dealing with an infection
  • Summary
  • 8 - Risk and Vulnerability Assessments
  • Cybersecurity and risk management
  • Why risk management is the foundation of cyber security?
  • What is risk?
  • Standards and best practices for risk management
  • Methodologies for assessing risk within industrial control systems
  • Security tests
  • Security audits
  • Security and vulnerability assessments
  • Establishing a testing and assessment methodology
  • Tailoring a methodology for industrial networks
  • Theoretical versus physical tests
  • On-line versus off-line physical tests
  • System characterization
  • Data collection.
  • Scanning of industrial networks
  • Device scanners
  • Vulnerability scanners
  • Traffic scanners
  • Live host identification
  • "Quiet"/"friendly" scanning techniques
  • Potentially "noisy"/"dangerous" scanning techniques
  • Port mirroring and span ports
  • Command line tools
  • Hardware and software inventory
  • Data flow analysis
  • Threat identification
  • Threat actors/sources
  • Threat vectors
  • Threat events
  • Identification of threats during security assessments
  • Vulnerability identification
  • Vulnerability scanning
  • Configuration auditing
  • Vulnerability prioritization
  • Common vulnerability scoring system
  • Process vulnerabilities
  • Risk classification and ranking
  • Consequences and impact
  • How to estimate consequences and likelihood?
  • Risk ranking
  • Cyber-physical threat modeling
  • How does one model a cyber-physical threat?
  • Using simulations versus labs for threat modeling
  • Cybersecurity HAZOP
  • Risk reduction and mitigation
  • Summary
  • 9 - Establishing Zones and Conduits
  • Security zones and conduits explained
  • Identifying and classifying security zones and conduits
  • Recommended security zone separation
  • Network connectivity
  • Control loops
  • Supervisory controls
  • Plant-level control processes
  • Control data storage
  • Trading communications
  • Remote access
  • Users and roles
  • Protocols
  • Criticality
  • Establishing security zones and conduits
  • Using microsegmentation to establish zones and conduits
  • Creating a zone and conduit map
  • Summary
  • 10 - OT Attack and Defense Lifecycles
  • Attack lifecycles and kill chains
  • Obtaining access to industrial networks
  • Planning
  • Preparation
  • Intrusion
  • Enablement
  • Execution
  • Manipulation of industrial networks
  • Development and test
  • Delivery, installation, and modification
  • Execution
  • Defense lifecycles
  • Identify
  • Protect.
  • Detect.