Securing Industrial Control Systems and Safety Instrumented Systems A Practical Guide for Safeguarding Mission and Safety Critical Systems
As modern process facilities become increasingly sophisticated and vulnerable to cyber threats, securing critical infrastructure is more crucial than ever. This book offers an indispensable guide to industrial cybersecurity and Safety Instrumented Systems (SIS), vital for maintaining the safety and...
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Birmingham, England :
Packt Publishing Ltd
[2024]
|
Edición: | First edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009845439206719 |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright and Credits
- Dedications
- Foreword
- Contributors
- Table of Contents
- Preface
- Part 1: Safety Instrumented Systems
- Chapter 1: Introduction to Safety Instrumented Systems (SISs)
- Understanding SIS
- SIS elements
- BPCS versus SIS
- SIS applications - where are they used?
- What is ICS cybersecurity?
- How do IT and engineering communities perceive ICS cybersecurity?
- Exploring relevant cybersecurity and functional safety standards
- Examining the safety and cybersecurity lifecycle
- Safety lifecycle
- Cybersecurity lifecycle
- Summary
- Further reading
- Chapter 2: SIS Evolution and Trends
- The history and evolution of SISs
- The need for protecting SISs
- ICS cyber risk trends and evolution
- The intersection of safety and cybersecurity
- ICS threat landscape
- ICS cybersecurity incidents and lessons learned
- Summary
- Further reading
- Chapter 3: SIS Security Design and Architecture
- Understanding DiD and LOPA principles
- The DiD strategy
- The LOPA strategy
- ICS security design and architecture
- The Purdue model
- ICS key components for safety functions
- ICS zoning and conduits
- SIS secure architecture
- Managing entry points
- Example SIS reference architectures
- Safety network protocols
- HART
- Modbus
- OPC
- SafeEthernet (HIMA)
- Vnet/IP (Yokogawa)
- ProfiSafe
- Functional Safety Over EtherCAT (FSoE)
- CIP Safety
- CC-Link Safety
- openSAFETY
- ICS proprietary protocols
- Lab exercise - TRITON
- Summary
- Further reading
- Part 2: Attacking and Securing SISs
- Chapter 4: Hacking Safety Instrumented Systems
- ICS attacks
- Process (physical) attacks
- Cyber attacks
- Understanding the SIS attack surface
- SuCs
- Abusing the HMI
- Attacking the SIS controller
- (P)0wning the S-EWS
- Abusing the IAMS
- Replaying traffic.
- Reverse engineering a transmitter of field devices
- Bypassing a key switch
- Putting it all together
- Lab exercise - ReeR MOSAIC M1S safety PLC security assessment
- Summary
- Further reading
- Chapter 5: Securing Safety Instrumented Systems
- Security design and engineering
- The secure-by-design principle
- Managing the ICS cybersecurity lifecycle
- Technology and product selection
- CSMSs
- SIS - The need for integral security
- Operational policies and procedures
- GOM
- Operation and cybersecurity maintenance
- Hazard
- Criticality
- Reliability
- Summary
- Further reading
- Part 3: Risk Management and Compliance
- Chapter 6: Cybersecurity Risk Management of SISs
- Importance of cyber risk assessment
- Risk assessment objectives
- SIS risk assessment principles
- Consequence-based risk assessment
- Cybersecurity risk assessment methodologies
- Conducting risk assessments in SISs
- IEC 62443-3-2
- BowTie
- NAMUR
- The continuous nature of risk assessment
- Summary
- Further reading
- Chapter 7: Security Standards and Certification
- The evolution of standards and legislation
- Industry-relevant certifications
- Identifying key stakeholders and the broader ecosystem
- Resources and initiatives
- Summary
- Further reading
- Chapter 8: The Future of ICS and SIS: Innovations and Challenges
- The current state of ICS cybersecurity innovation
- Emerging technologies including opportunities and challenges
- Artificial Intelligence
- Quantum computing
- Cloud computing
- Autonomous operations
- Zero Trust
- Self-healing systems
- Summary
- Further reading
- Index
- Other Books You May Enjoy.