Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Industrial Cybersecurity
Industrial Cybersecurity

Industrial Cybersecurity: Efficiently secure critical infrastructure systems

eBook
€25.99 €37.99
Paperback
€47.99
Subscription
Free Trial
Renews at €18.99p/m

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
Table of content icon View table of contents Preview book icon Preview Book

Industrial Cybersecurity

Insecure by Inheritance

After last chapter's high-level explanation of what an Industrial control system (ICS) is, what it does, and what it is made of, let's start with a deep dive into a select set of technologies that can be found in most Industrial controls systems and examine some of the vulnerabilities or weaknesses that these technologies have.

In this chapter, we will cover the following topics:

  • The Industrial control system history.
  • The Industrial communication protocols with particular attention to:
    • PROFINET
    • EtherNet/IP
    • Common Industrial protocol
    • Ethernet
    • Modbus TCP/IP
  • Common IT protocols found in the ICS

Industrial control system history

Way back, before Programmable Logic Controllers (PLCs) became the norm, plant floor automation was performed with racks and racks of industrial relays, pneumatic plunger timers, and electromagnetically counters to control the starting and stopping of motors, opening of valves, and other control-related process interactions. The program that ran the control for such a setup was not a program at all but a combination of interconnected circuits, timers, and relays. By forming the electrical paths, physical actions such as opening valves, running motors, and turning on lights were accomplished. The programmer of a relay system like this was the plant floor electrical engineer and program changes involved physically changing the electrical circuits. There was no programmer's Terminal or interface to connect to and there weren&apos...

Modbus and Modbus TCP/IP

Introduced in 1979, Modbus has been the de facto standard ever since. Modbus is an application layer messaging protocol. Placed at level 7 of the OSI model, it provides client/server communication between devices connected via different types of communication buses or communication media. Modbus is the most widely used ICS protocol, mainly because it's a proven and reliable protocol, simple to implement, and open to use without any royalties:

On the left-hand side in the preceding figure, we see Modbus communicating over serial (RS-232 or RS-485). The same application layer protocol is used for communicating over Ethernet, as shown on the right-hand side.

The Modbus protocol is built upon a request and reply model. It uses Function Code in combination with a data section. The Function Code specifies which service is requested for or responded to...

PROFINET

Process Field Net, or PROFINET, is an industry technical standard in accordance with IEC 61784-2. It is used for data communication over Industrial Ethernet and designed for collecting data from, and controlling of, equipment in Industrial systems with delivery time approaching of 1 ms. The standard is maintained and supported by PROFIBUS & PROFINET International (PI), an umbrella organization headquartered in Karlsruhe, Germany.

PROFINET shouldn't be confused with PROFIBUS, which is a fieldbus communication standard for real-time automation purposes, first introduced in 1989 by the German department of education and research and later adopted by Siemens. The following diagram shows the specific place in the Industrial control system for each protocol:

 

PROFINET supports Ethernet, HART, ISA100, and Wi-Fi, as well as legacy buses found on older...

Common IT protocols found in the ICS

Although not directly industrial control protocols by themselves, the upcoming sections are a list of common IT protocols that can be found on OT networks. The list includes a summarization of their well-known vulnerabilities.

HTTP

Many ICS devices will have built-in diagnostic web pages and some form of web server to allow access to the diagnostic pages. HTTP is known to have the following vulnerabilities:

  • Vulnerable HTTP server application code
  • Hard coded credentials
  • SQL injection
  • Cross-site scripting
  • Broken authentication and session management
  • Insecure direct object references
  • Cross-site request forgery
  • Security misconfiguration
  • Insecure cryptographic storage
  • Failure to restrict URL...

Summary

This chapter covers only some of the vulnerabilities found in only some of the industrial protocols out there. There are many more protocols and many more vulnerabilities and exploitation methods we could discuss, probably filling an entire book by itself. I choose the protocols that did make the chapter based on their prevalence out on the ICS networks in plants and factories. Then, I picked the most obvious vulnerabilities for those protocols. As it turns out, these vulnerabilities are also easy to exploit. This is the state of affairs ICS security is in, unfortunately. Apart from one or two extremely well-funded attacks, most ICS (OT) breaches use attack vectors that were eliminated from IT networks ages ago. A recently discovered malware campaign is a great example of this. The malware that took down the Ukrainian power grid in 2015 was first believed to be a...

Left arrow icon Right arrow icon

Key benefits

  • Learn about endpoint protection such as anti-malware implementation, updating, monitoring, and sanitizing user workloads and mobile devices
  • Filled with practical examples to help you secure critical infrastructure systems efficiently
  • A step-by-step guide that will teach you the techniques and methodologies of building robust infrastructure systems

Description

With industries expanding, cyber attacks have increased significantly. Understanding your control system’s vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security measures necessary to protect critical infrastructure systems and will get you up to speed with identifying unique challenges.Industrial cybersecurity begins by introducing Industrial Control System (ICS) technology, including ICS architectures, communication media, and protocols. This is followed by a presentation on ICS (in) security. After presenting an ICS-related attack scenario, securing of the ICS is discussed, including topics such as network segmentation, defense-in-depth strategies, and protective solutions. Along with practical examples for protecting industrial control systems, this book details security assessments, risk management, and security program development. It also covers essential cybersecurity aspects, such as threat detection and access management. Topics related to endpoint hardening such as monitoring, updating, and anti-malware implementations are also discussed.

Who is this book for?

If you are a security professional and want to ensure a robust environment for critical infrastructure systems, this book is for you. IT professionals interested in getting into the cyber security domain or who are looking at gaining industrial cyber security certifications will also find this book useful.

What you will learn

  • Understand industrial cybersecurity, its control systems and operations
  • Design security-oriented architectures, network segmentation, and security support services
  • Configure event monitoring systems, anti-malware applications, and endpoint security
  • Gain knowledge of ICS risks, threat detection, and access management
  • Learn about patch management and life cycle management
  • Secure your industrial control systems from design through retirement

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Oct 18, 2017
Length: 456 pages
Edition : 1st
Language : English
ISBN-13 : 9781788395984
Category :
Concepts :

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning

Product Details

Publication date : Oct 18, 2017
Length: 456 pages
Edition : 1st
Language : English
ISBN-13 : 9781788395984
Category :
Concepts :

Packt Subscriptions

See our plans and pricing
Modal Close icon
€18.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
€189.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts
€264.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total 200.97
Cybersecurity Attacks (Red Team Activity)
€114.99
Industrial Cybersecurity
€47.99
Cybersecurity - Attack and Defense Strategies
€37.99
Total 200.97 Stars icon

Table of Contents

12 Chapters
Industrial Control Systems Chevron down icon Chevron up icon
Insecure by Inheritance Chevron down icon Chevron up icon
Anatomy of an ICS Attack Scenario Chevron down icon Chevron up icon
Industrial Control System Risk Assessment Chevron down icon Chevron up icon
The Purdue Model and a Converged Plantwide Ethernet Chevron down icon Chevron up icon
The Defense-in-depth Model Chevron down icon Chevron up icon
Physical ICS Security Chevron down icon Chevron up icon
ICS Network Security Chevron down icon Chevron up icon
ICS Computer Security Chevron down icon Chevron up icon
ICS Application Security Chevron down icon Chevron up icon
ICS Device Security Chevron down icon Chevron up icon
The ICS Cybersecurity Program Development Process Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.8
(12 Ratings)
5 star 83.3%
4 star 8.3%
3 star 8.3%
2 star 0%
1 star 0%
Filter icon Filter
Top Reviews

Filter reviews by




Dr. Larry Leibrock Dec 12, 2018
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Very fine overview of a complex set of topics dealing with both IT and OT. The book is useful in that it provides terms of art, and contexts for industrial cyber security topics. The only glaring issues are the absence of both incident response and forensics post intrusion. Get this book if you are getting in the industrial cyber business
Amazon Verified review Amazon
Lee A Carter Jan 04, 2022
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Well balanced book, some of the content is a little dated in parts but if you take the spirit of what is being said and translate this into todays Windows technology then thats fine. This isn't the silver bullet and the only resource you should have in your library, however it is a really good foundation and a great set of role plays in the later chapters.
Amazon Verified review Amazon
George R. Clark Nov 15, 2017
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Having had experience with Industrial Control Systems (ICS) and their security, I approached the book as a review – been there done that I thought. Instead, after re-visiting the history of how ICS evolved to its current insecure state, I found myself engaged in a mystery. How the structure of an ICS attack progressed from a seemingly innocent email to the potential of malicious control over the entire facility. The conversational prose of this page turner made me acutely aware that my prior experience was insufficient per the deep skills and knowledge needed to mount an effective defense. That unease was quickly remedied. The chapters that followed provided details, references, step-by-step procedures, and suggested deep learning while documenting how to secure and protect an ICS and develop an ongoing Cybersecurity program.The epiphany for me was that Cybersecurity has to become ingrained in the corporate culture similar to Safety. The Electrical and Instrument technicians of tomorrow need the knowledge Industrial Cybersecurity can provide. Industrial Cybersecurity is a perfect text. It’s depth of detail and the well defined lab exercises would readily establish the basis of an advanced course.George R. Clark
Amazon Verified review Amazon
P~ Jan 08, 2018
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This book provides a wealth of valuable information for Cybersecurity professionals with IT-only experience, control system engineers who are delving into security, or it could serve as a good reference for seasoned Industrial Control System (ICS) Security Engineers and Consultants. The practical, hands-on approach utilized in this book makes it accessible to newcomers in this field, thereby allowing them to gain a solid foundation of the ICS security concepts through lab related exercises. Given the criticality of most ICS production environments, an aspiring ICS security engineer simply does not have the luxury of learning through experimentation within a production environment (due to the potential of disrupting process operations and causing real-world implications). Therefore, the demonstration based learning approach utilized in this book offers an effective means of solidifying security concepts and evaluating distinct behaviors or ICS-specific protocols using packet analysis tools such as Wireshark.Although no single book can cover the vast amount of knowledge that is required to design and implement secure ICS systems, I think this book provides a sound primer and multi-tiered design approach to address ICS security holistically in the face of many dynamic cyber threats. As an ICS Security Consultant myself, I am pleased with the breadth of information contained in this book and how the author shared his security knowledge and experience in a practical way. The ICS community of security professionals is relatively small when compared to the overall number of professionals within the Cyber Security discipline. However, though knowledge sharing and dissemination of content such as this book, I think we will continue to make progressive steps forward to safeguard ICS assets and minimize the potential of businesses being severely impacted by security vulnerabilities.
Amazon Verified review Amazon
Eduard Polyakov Nov 03, 2017
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This is a very well written book on a subject that should be of interest to any network and security professional as well as engineers in charge of manufacturing plants and critical infrastructure systems. We are all aware of recent security breaches at companies who supposed to be at the leading edge of security. Now imagine a typical manufacturing plant or public utility system with network infrastructure and technologies years behind and not enough knowledgeable people to support.I think this book can help to educate about industrial security problems, and more importantly show concrete steps, methods and tools to improve the situation. It also shows some of the inherent limitations of the industrial systems and why you cannot secure them in the same way (or as quickly) as IT systems. A lot of details and practical examples.I liked chapter 4 the most (Risk assessment), gives you tools to select and prioritize risk mitigations. Chapter 3 (example of an attack) is just fun to read! Chapter 2 goes pretty deep into ICS protocols details - security by obscurity is not valid argument, don't need to be a foreign government agent to hack these things. A lot of attention is paid to concepts of segmentation and zone security as well as defense in depth.Overall I must say this is a great book for any security professional as well as control engineers and plant managers.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.