中图网(原中国图书网):网上书店,尾货特色书店,30万种特价书低至2折!

歡迎光臨中圖網 請 | 注冊

包郵 工業網絡安全

出版社:東南大學出版社出版時間:2018-10-01
開本: 24cm 頁數: 440頁
中 圖 價:¥34.7(3.5折) 定價  ¥99.0 登錄后可看到會員價
加入購物車 收藏
開年大促, 全場包郵
?新疆、西藏除外
溫馨提示:5折以下圖書主要為出版社尾貨,大部分為全新(有塑封/無塑封),個別圖書品相8-9成新、切口
有劃線標記、光盤等附件不全詳細品相說明>>
本類五星書更多>

工業網絡安全 版權信息

工業網絡安全 內容簡介

  《工業網絡安全(影印版)》首先介紹了工業控制系統(ICS)技術,包括芯片的體系結構、通信媒介和協議。在介紹了ICS相關的攻擊場景之后,討論了ICS的安全性,包括網絡分割、縱深防御策略和保護解決方案等主題。除了保護工業控制系統的實際例子外,本書還詳細介紹了安全評估、風險管理和安全程序開發。它還涵蓋了網絡安全方面的內容,如威脅檢測和訪問管理,討論了與端點硬化相關的主題,如監視、更新和反惡意軟件實現。

工業網絡安全 目錄

Preface Chapter 1: Industrial Control Systems An overview of an Industrial control system The view function The monitor function The control function The Industrial control system architecture Programmable logic controllers Human Machine Interface Supervisory Control and Data Acquisition Distributed control system Safety instrumented system The Purdue model for Industrial control systems The enterprise zone Level 5 - Enterprise network Level 4 - Site business planning and logistics Industrial Demilitarized Zone The manufacturing zone Level 3 - Site operations Level 2 - Area supervisory control Level 1 - Basic control Level 0 - Process Industrial control system communication media and protocols Regular information technology network protocols Process automation protocols Industrial control system protocols Building automation protocols Automatic meter reading protocols Communication protocols in the enterprise zone Communication protocols in the Industrial zone Summary Chapter 2: Insecure by Inheritance Industrial control system history Modbus and Modbus TCP/IP Breaking Modbus Using Python and Scapy to communicate over Modbus Replaying captured Modbus packets PROFINET PROFINET packet replay attacks $7 communication and the stop CPU vulnerability EtherNet/IP and the Common Industrial Protocol Shodan: The scariest search engine on the internet Common IT protocols found in the ICS HTTP File Transfer Protocol Telnet Address Resolution Protocol ICMP echo request Summary Chapter 3: Anatomy of an ICS Attack Scenario Setting the stage The Slumbertown paper mill Trouble in paradise Building a virtual test network Clicking our heels What can the attacker do with their access The cyber kill chain Phase two of the Slumbertown Mill ICS attack Other attack scenarios Summary Chapter 4: Industrial Control System Risk Assessment Attacks, objectives, and consequences Risk assessments A risk assessment example Step 1 - Asset identification and system characterization Step 2 - Vulnerability identification and threat modeling Discovering vulnerabilities Threat modeling Step 3 - Risk calculation and mitigation Summary Chapter 5: The Purdue Model and a Converged Plantwide Ethernet The Purdue Enterprise Reference Architecture The Converged Plantwide Enterprise The safety zone Cell/area zones Level 0 - The process Level 1 - Basic control Level 2 - Area supervisory control The manufacturing zone Level 3 - Site manufacturing operations and control The enterprise zone Level 4 - Site business planning and logistics Level 5 - Enterprise Level 3.5 - The Industrial Demilitarized Zone The CPwE industrial network security framework Summary Chapter 6: The Defense-in-depth Model ICS security restrictions How to go about defending an ICS The ICS is extremely defendable The defense-in-depth model Physical security Network security Computer security Application security Device security Policies, procedures, and awareness Summary Chapter 7: Physical ICS Security The ICS security bubble analogy Segregation exercise Down to it - Physical security Summary Chapter 8: ICS Network Security Designing network architectures for security Network segmentation The Enterprise Zone The Industrial Zone Cell Area Zones Level 3 site operations The Industrial Demilitarized Zone Communication conduits Resiliency and redundancy Architectural overview Firewalls Configuring the active-standby pair of firewalls Security monitoring and logging Network packet capturing Event logging Security information and event management Firewall logs Configuring the Cisco ASA firewall to send log data to the OSSIM server Setting the syslog logging level for Cisco devices Network intrusion detection logs Why not intrusion prevention Configuring the Cisco Sourcefire IDS to send log data to the OSSIM server Router and switch logs Configuring Cisco lOS to log to the syslog service of the OSSIM server Operating system logs Collecting logs from a Windows system Installing and configuring NXLog CE across your Windows hosts Application logs Reading an application log file with an HIDS agent on Windows Network visibility Summary Chapter 9: ICS Computer Security Endpoint hardening Narrowing the attack surface Limiting the impact of a compromise Microsoft Enhanced Mitigation Experience Toolkit Configuring EMET for a Rockwell Automation application server Microsoft AppLocker Microsoft AppLocker configuration Configuration and change management Patch management Configuring Microsoft Windows Server Update Services for the industrial zone Configuring the Cisco ASA firewall Creating the Windows Server Update Services server Configuring Windows client computers to get updates from the WSUS server Endpoint protection software Host-based firewalls Anti-malware software Types of malware Application whitelisting software Application whitelisting versus blacklisting How application whitelisting works Symantec's Embedded Security: Critical system protection Building the Symantec's Embedded Security: Critical System Protection management server Monitoring and logging Summary Chapter 10: ICS Application Security Application security Input validation vulnerabilities Software tampering Authentication vulnerabilities Authorization vulnerabilities Insecure configuration vulnerabilities Session management vulnerabilities Parameter manipulation vulnerabilities Application security testing OpenVAS security scan ICS application patching ICS secure SDLC The definition of secure SDLC Summary Chapter 11: ICS Device Security ICS device hardening ICS device patching The ICS device life cycle ICS device security considerations during the procurement phase ICS device security considerations during the installation phase ICS device security considerations during the operation phase ICS device security considerations for decommissioning and disposal Summary Chapter 12: The ICS Cybersecurity Program Development Process The NIST Guide to Industrial control systems security Obtaining senior management buy-in Building and training a cross-functional team Defining charter and scope Defining ICS-specific security policies and procedures Implementing an ICS security risk-management framework Categorizing ICS systems and network assets Selecting ICS security controls Performing (initial) risk assessment Implementing the security controls The ICS security program development process Security policies, standards, guidelines, and procedures Defining ICS-specific security policies, standards, and procedures Defining and inventorying the ICS assets Performing an initial risk assessment on discovered ICS assets The Slumbertown Paper Mill initial risk assessment Defining and prioritizing mitigation activities Defining and kicking off the security improvement cycle Summary Index
展開全部

工業網絡安全 作者簡介

帕斯卡·阿克曼(Pascal Ackerman) is a seasoned industrial security professional with a degree in electrical engineering and over 15 years of experience in designing, troubleshooting, and securing large-scale industrial control systems and the various types of network technologies they utilize. After more than a decade of hands-on, in-the-field experience, he joined Rockwell Automation in 2015 and is currently employed as Senior Consultant of Industrial Cybersecurity with the Network and Security Services Group. He recently became a digital nomad and now travels the world with his family while fighting cyber adversaries.

商品評論(0條)
暫無評論……
書友推薦
本類暢銷
編輯推薦
返回頂部
中圖網
在線客服
主站蜘蛛池模板: 威廉希尔WilliamHill·足球(中国)体育官方网站 | 空气弹簧|橡胶气囊|橡胶空气弹簧-上海松夏减震器有限公司 | 转向助力泵/水泵/发电机皮带轮生产厂家-锦州华一精工有限公司 | 磁力去毛刺机_去毛刺磁力抛光机_磁力光饰机_磁力滚抛机_精密金属零件去毛刺机厂家-冠古科技 | 选矿设备,选矿生产线,选矿工艺,选矿技术-昆明昆重矿山机械 | 建大仁科-温湿度变送器|温湿度传感器|温湿度记录仪_厂家_价格-山东仁科 | 两头忙,井下装载机,伸缩臂装载机,30装载机/铲车,50装载机/铲车厂家_价格-莱州巨浪机械有限公司 | 天津力值检测-天津管道检测-天津天诚工程检测技术有限公司 | 金属管浮子流量计_金属转子流量计厂家-淮安润中仪表科技有限公司 | 岩棉板|岩棉复合板|聚氨酯夹芯板|岩棉夹芯板|彩钢夹芯板-江苏恒海钢结构 | 高温链条油|高温润滑脂|轴承润滑脂|机器人保养用油|干膜润滑剂-东莞卓越化学 | 吸污车_吸粪车_抽粪车_电动三轮吸粪车_真空吸污车_高压清洗吸污车-远大汽车制造有限公司 | 真空泵维修保养,普发,阿尔卡特,荏原,卡西亚玛,莱宝,爱德华干式螺杆真空泵维修-东莞比其尔真空机电设备有限公司 | 12cr1mov无缝钢管切割-15crmog无缝钢管切割-40cr无缝钢管切割-42crmo无缝钢管切割-Q345B无缝钢管切割-45#无缝钢管切割 - 聊城宽达钢管有限公司 | EPDM密封胶条-EPDM密封垫片-EPDM生产厂家 | 一点车讯-汽车网站,每天一点最新车讯! | 番茄畅听邀请码怎么输入 - Dianw8.com | 合肥白癜风医院_合肥治疗白癜风医院_合肥看白癜风医院哪家好_合肥华研白癜风医院 | 砂尘试验箱_淋雨试验房_冰水冲击试验箱_IPX9K淋雨试验箱_广州岳信试验设备有限公司 | 美国查特CHART MVE液氮罐_查特杜瓦瓶_制造全球品质液氮罐 | 无尘烘箱_洁净烤箱_真空无氧烤箱_半导体烤箱_电子防潮柜-深圳市怡和兴机电 | 低噪声电流前置放大器-SR570电流前置放大器-深圳市嘉士达精密仪器有限公司 | 不锈钢酒柜|恒温酒柜|酒柜定制|酒窖定制-上海啸瑞实业有限公司 | 谷梁科技| 臭氧老化试验箱,高低温试验箱,恒温恒湿试验箱,防水试验设备-苏州亚诺天下仪器有限公司 | 档案密集柜_手动密集柜_智能密集柜_内蒙古档案密集柜-盛隆柜业内蒙古密集柜直销中心 | 冷油器-冷油器换管改造-连云港灵动列管式冷油器生产厂家 | 卫生纸复卷机|抽纸机|卫生纸加工设备|做卫生纸机器|小型卫生纸加工需要什么设备|卫生纸机器设备多少钱一台|许昌恒源纸品机械有限公司 | 济南网站建设_济南网站制作_济南网站设计_济南网站建设公司_富库网络旗下模易宝_模板建站 | 广东佛电电器有限公司|防雷开关|故障电弧断路器|智能量测断路器 广东西屋电气有限公司-广东西屋电气有限公司 | 热风机_工业热风机生产厂家上海冠顶公司提供专业热风机图片价格实惠 | 珠海网站建设_响应网站建设_珠海建站公司_珠海网站设计与制作_珠海网讯互联 | 质检报告_CE认证_FCC认证_SRRC认证_PSE认证_第三方检测机构-深圳市环测威检测技术有限公司 | 彩超机-黑白B超机-便携兽用B超机-多普勒彩超机价格「大为彩超」厂家 | 沈阳庭院景观设计_私家花园_别墅庭院设计_阳台楼顶花园设计施工公司-【沈阳现代时园艺景观工程有限公司】 | 呼末二氧化碳|ETCO2模块采样管_气体干燥管_气体过滤器-湖南纳雄医疗器械有限公司 | BOE画框屏-触摸一体机-触控查询一体机-触摸屏一体机价格-厂家直销-触发电子 | 食药成分检测_调料配方还原_洗涤剂化学成分分析_饲料_百检信息科技有限公司 | 洛阳永磁工业大吊扇研发生产-工厂通风降温解决方案提供商-中实洛阳环境科技有限公司 | 华溶溶出仪-Memmert稳定箱-上海协烁仪器科技有限公司 | 东莞压铸厂_精密压铸_锌合金压铸_铝合金压铸_压铸件加工_东莞祥宇金属制品 |