Nuclear Infrastructure Protection and Homeland Security

Nuclear Infrastructure Protection and Homeland SecurityExperts agree, though it is already important, nuclear power will soon be critical to the maintenance of contemporary society. With the heightened importance of nuclear energy comes a heightened threat of terrorism. The possibility of nuclear energy infrastructure terrorism-that is, the use of weapons to cause damage to the nuclear energy industrial sector, which would have widespread, devastating effects-is very real. In Nuclear Infrastructure Protection and Homeland Security, authors Frank R. Spellman and Melissa L. Stoudt present all the information needed for nuclear infrastructure employers and employees to handle security threats they must be prepared to meet. The book focuses on three interrelated nuclear energy infrastructure segments: nuclear reactors, radioactive materials, and nuclear waste. It presents common-sense methodologies in a straightforward manner, so the text is accessible even to those with little experience with nuclear energy who are nonetheless concerned about the protection of our nuclear infrastructure. Important safety and security principles are outlined, along with security measures that can be implemented to ensure the safety of nuclear facilities.

Price: $85.00

Click here to buy from Amazon

Enhanced by Zemanta

Security Assessment of SCADA Protocols

Security Assessment of SCADA Protocols - A Taxonomy Based Methodology for the Identification of Security Vulnerabilities in SCADA ProtocolsModern industrial facilities, such as oil refineries, chemical factories, electric power generation plants, etc. are large, complex, distributed systems. These systems are monitored and controlled by networks of special purpose embedded computing devices such as sensors, actuators, and PLCs. These industrial control networks are commonly called SCADA (Supervisory Control and Data Acquisition) networks. The increasing interconnectivity of SCADA networks has exposed them to a wide range of network security problems. One of the important issues in securing SCADA networks is to identify vulnerabilities in the communication protocols. This book analyses existing qualitative security assessment guidelines, specifically attack and vulnerability taxonomies, and proposes a new framework for organizing information about known attacks and vulnerabilities to find unknown or similar vulnerabilities in new systems. This framework is used to organize information related to known vulnerabilities in SCADA protocols into a taxonomy that provides a systematic methodology for the security assessment of other SCADA protocols.

Price: $64.00

Click here to buy from Amazon

Cybersecurity for SCADA Systems

Cybersecurity for SCADA SystemsSCADA technology quietly operates in the background of critical utility and industrial facilities nationwide. This important tool efficiently manages utility assets, refineries and other critical industrial segments, but protecting SCADA networks from cyber attacks, hackers and even physical assault is becoming a test of will, cleverness and determination. Cybersecurity for SCADA Systems provides a high-level overview of this unique technology, with an explanation of each market segment. Readers will understand the vital issues, and learn strategies for decreasing or eliminating system vulnerabilities.

Benefits for readers: Functional breakdown and explanation of the typical features, capabilities, and components of a SCADA system; IT and cybersecurity technology and terminology overview and explanation; Industry-specific as well as generalized discussion of SCADA vulnerabilities and available remediation strategies; and Discussion of physical and electronic security issues and strategies

Suitable for the non-technical management level personnel as well as IT personnel without SCADA experience

Price: $89.00

Click here to buy from Amazon

Telemetry: Scada, Boeing NC-135, EC-135, Industrial Control Systems

Telemetry: Scada, Boeing Nc-135, Boeing Ec-135, Gps Wildlife Tracking, Industrial Control Systems, Industrial Safety SystemsChapters: Scada, Boeing Nc-135, Boeing Ec-135, Gps Wildlife Tracking, Industrial Control Systems, Industrial Safety Systems, Remote Terminal Unit, Sbmv Protocol, Bmrst, Power Line Carrier Communication, Eugene Law, Emr Telemetry, Oil and Gas Industry Metering and Control System, Frame Synchronizer, Snow Pillow, Range Safety and Telemetry System, Advanced Plant Management System, Non Intrusive Appliance Monitoring, Em Telemetry, Telemeter, Ballistic Missile Range Safety Technology. Source: Wikipedia. Pages: 87. Not illustrated. Free updates online. Purchase includes a free trial membership in the publisher's book club where you can select from more than a million books without charge. Excerpt: SCADA stands for supervisory control and data acquisition. It generally refers to an industrial control system: a computer system monitoring and controlling a process. The process can be industrial, infrastructure or facility-based as described below: A SCADA System usually consists of the following subsystems: There is, in several industries, considerable confusion over the differences between SCADA systems and distributed control systems (DCS). Generally speaking, a SCADA system usually refers to a system that coordinates, but does not control processes in real time. The discussion on real-time control is muddied somewhat by newer telecommunications technology, enabling reliable, low latency, high speed communications over wide areas. Most differences between SCADA and DCS are culturally determined and can usually be ignored. As communication infrastructures with higher capacity become available, the difference between SCADA and DCS will fade. The term SCADA usually refers to centralized systems which monitor and control entire sites, or complexes of systems spread out over large areas (anything between an industrial plant and a country). Most control actions are performed automatically by Remote Terminal Units (“RTUs”).

Price: $19.99

Click here to buy from Amazon

Proceedings of the SCADA Security Scientific Symposium 2007

Proceedings of the SCADA Security Scientific Symposium 2007The Proceedings are a compilation of eleven technical research papers presented at Digital Bonds 2007 SCADA Security Scientific Symposium (S4). This level of technical detail is new to the SCADA Security community and is desperately needed to speed up progress and get past the FUD.

Table of Contents
Introduction
SCADA Protocol Implementation Analysis and Vulnerabilities
1. OPC Exposed Part I Interface Implementation Vulnerabilities
2. OPC Exposed Part II Denial of Service Attacks
3. ICCP Exposed: Assessing the Attack Surface of the Utility Stack”
4. Automated Testing of SCADA Protocols

Security Protocols for Control Systems

5. Anonymous, Authenticated Communication for Secure Sharing
of SCADA and Control System Information
6. SCADA Protocol Obfuscation: A Proactive Defense Line in
SCADA Systems
7. N-Secrecy Authentication Response to Graduated Threat Levels in SCADA Network

Calculating Risk
8. A Methodology for Estimating the Mean Time-to-Compromise of a System
9. SCADA Honeynets: How to Build and Analyzing Attacks

Detecting Attacks
10. Identifying Attacks on Control Systems by Scripting Event Aggregation and Correlation

11. Using Model-based Intrusion Detection for SCADA Networks

The complete introduction and abstracts are available at: http://www.digitalbond.com/wp-content/uploads/2007/02/s4_overview2.pdf

Price:

Click here to buy from Amazon