Proceedings of the SCADA Security Scientific Symposium 2007

Proceedings of the SCADA Security Scientific Symposium 2007The Proceedings are a compilation of eleven technical research papers presented at Digital Bonds 2007 SCADA Security Scientific Symposium (S4). This level of technical detail is new to the SCADA Security community and is desperately needed to speed up progress and get past the FUD.

Table of Contents
Introduction
SCADA Protocol Implementation Analysis and Vulnerabilities
1. OPC Exposed Part I Interface Implementation Vulnerabilities
2. OPC Exposed Part II Denial of Service Attacks
3. ICCP Exposed: Assessing the Attack Surface of the Utility Stack”
4. Automated Testing of SCADA Protocols

Security Protocols for Control Systems

5. Anonymous, Authenticated Communication for Secure Sharing
of SCADA and Control System Information
6. SCADA Protocol Obfuscation: A Proactive Defense Line in
SCADA Systems
7. N-Secrecy Authentication Response to Graduated Threat Levels in SCADA Network

Calculating Risk
8. A Methodology for Estimating the Mean Time-to-Compromise of a System
9. SCADA Honeynets: How to Build and Analyzing Attacks

Detecting Attacks
10. Identifying Attacks on Control Systems by Scripting Event Aggregation and Correlation

11. Using Model-based Intrusion Detection for SCADA Networks

The complete introduction and abstracts are available at: http://www.digitalbond.com/wp-content/uploads/2007/02/s4_overview2.pdf

Price:

Click here to buy from Amazon

Critical Infrastructure Protection (IFIP Advances in Information and Communication Technology)

Critical Infrastructure Protection (IFIP Advances in Information and Communication Technology)The information infrastructure–comprising computers, embedded devices, networks and software systems–is vital to operations in every sector. Global business and industry, governments, and society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed.

This book contains a selection of 27 edited papers from the First Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection.





Price: $149.00

Click here to buy from Amazon

Protecting Industrial Control Systems from Electronic Threats

Protecting Industrial Control Systems from Electronic ThreatsAimed at both the novice and expert in IT security and industrial control systems (ICS), this book will help readers gain a better understanding of protecting ICSs from electronic threats. Cyber security is getting much more attention and ‘SCADA security' (Supervisory Control and Data Acquisition) is a particularly important part of this field, as are Distributed Control Systems (DCS), Programmable Logic Controllers (PLCs), Remote Terminal Units (RTUs), Intelligent Electronic Devices (IEDs)-and all the other, field controllers, sensors, and drives, emission controls, and that make up the ‘intelligence' of modern industrial buildings and facilities. This book will help the reader better understand what is industrial control system cyber security, why is it different than IT security, what has really happened to date, and what needs to be done. Loads of practical advice is offered on everything from clarity on current cyber-security systems and how they can be integrated into general IT systems, to how to conduct risk assessments and how to obtain certifications, to future trends in legislative and regulatory issues affecting industrial security.

Price: $59.99

Click here to buy from Amazon

A Guide to Utility Automation: Amr, Scada, and It Systems for Electric Power

A Guide to Utility Automation: Amr, Scada, and It Systems for Electric PowerProvides a history of AMR, Automatic Meter Reading system, describing the essential attributes of families of AMR system technologies and notable suppliers. Discusses the vital competitive importance of new information systems and their needs for AMR data providing examples of how these systems can create strategic competitive advantage.







Price: $59.00

Click here to buy from Amazon

The Stuxnet Computer Worm and Industrial Control System Security (Defense, Security and Strategies)

The Stuxnet Computer Worm and Industrial Control System Security (Defense, Security and Strategies)In September 2010, media reports emerged about a new form of cyber attack that appeared to target Iran, although the actual target, if any, is unknown. Through the use of thumb drives in computers that were not connected to the Internet, a malicious software program known as Stuxnet infected computer systems that were used to control the functioning of a nuclear power plant. Once inside the system, Stuxnet had the ability to degrade or destroy the software on which it operated. This book examines the discovery of the Stuxnet worm which has raised several issues for Congress, including the effect on national security, what the government's response should be, whether an international treaty to curb the use of malicious software is necessary, and how such a treaty could be implemented.

Price: $125.00

Click here to buy from Amazon