Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Industrial Cybersecurity
Industrial Cybersecurity

Industrial Cybersecurity: Efficiently secure critical infrastructure systems

Arrow left icon
Profile Icon Pascal Ackerman
Arrow right icon
€18.99 per month
Full star icon Full star icon Full star icon Full star icon Half star icon 4.8 (12 Ratings)
Paperback Oct 2017 456 pages 1st Edition
eBook
€8.99 €37.99
Paperback
€47.99
Subscription
Free Trial
Renews at €18.99p/m
Arrow left icon
Profile Icon Pascal Ackerman
Arrow right icon
€18.99 per month
Full star icon Full star icon Full star icon Full star icon Half star icon 4.8 (12 Ratings)
Paperback Oct 2017 456 pages 1st Edition
eBook
€8.99 €37.99
Paperback
€47.99
Subscription
Free Trial
Renews at €18.99p/m
eBook
€8.99 €37.99
Paperback
€47.99
Subscription
Free Trial
Renews at €18.99p/m

What do you get with a Packt Subscription?

Free for first 7 days. $19.99 p/m after that. Cancel any time!
Product feature icon Unlimited ad-free access to the largest independent learning library in tech. Access this title and thousands more!
Product feature icon 50+ new titles added per month, including many first-to-market concepts and exclusive early access to books as they are being written.
Product feature icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Product feature icon Thousands of reference materials covering every tech concept you need to stay up to date.
Subscribe now
View plans & pricing
Table of content icon View table of contents Preview book icon Preview Book

Industrial Cybersecurity

Insecure by Inheritance

After last chapter's high-level explanation of what an Industrial control system (ICS) is, what it does, and what it is made of, let's start with a deep dive into a select set of technologies that can be found in most Industrial controls systems and examine some of the vulnerabilities or weaknesses that these technologies have.

In this chapter, we will cover the following topics:

  • The Industrial control system history.
  • The Industrial communication protocols with particular attention to:
    • PROFINET
    • EtherNet/IP
    • Common Industrial protocol
    • Ethernet
    • Modbus TCP/IP
  • Common IT protocols found in the ICS

Industrial control system history

Way back, before Programmable Logic Controllers (PLCs) became the norm, plant floor automation was performed with racks and racks of industrial relays, pneumatic plunger timers, and electromagnetically counters to control the starting and stopping of motors, opening of valves, and other control-related process interactions. The program that ran the control for such a setup was not a program at all but a combination of interconnected circuits, timers, and relays. By forming the electrical paths, physical actions such as opening valves, running motors, and turning on lights were accomplished. The programmer of a relay system like this was the plant floor electrical engineer and program changes involved physically changing the electrical circuits. There was no programmer's Terminal or interface to connect to and there weren&apos...

Left arrow icon Right arrow icon

Key benefits

  • Learn about endpoint protection such as anti-malware implementation, updating, monitoring, and sanitizing user workloads and mobile devices
  • Filled with practical examples to help you secure critical infrastructure systems efficiently
  • A step-by-step guide that will teach you the techniques and methodologies of building robust infrastructure systems

Description

With industries expanding, cyber attacks have increased significantly. Understanding your control system’s vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security measures necessary to protect critical infrastructure systems and will get you up to speed with identifying unique challenges.Industrial cybersecurity begins by introducing Industrial Control System (ICS) technology, including ICS architectures, communication media, and protocols. This is followed by a presentation on ICS (in) security. After presenting an ICS-related attack scenario, securing of the ICS is discussed, including topics such as network segmentation, defense-in-depth strategies, and protective solutions. Along with practical examples for protecting industrial control systems, this book details security assessments, risk management, and security program development. It also covers essential cybersecurity aspects, such as threat detection and access management. Topics related to endpoint hardening such as monitoring, updating, and anti-malware implementations are also discussed.

Who is this book for?

If you are a security professional and want to ensure a robust environment for critical infrastructure systems, this book is for you. IT professionals interested in getting into the cyber security domain or who are looking at gaining industrial cyber security certifications will also find this book useful.

What you will learn

  • Understand industrial cybersecurity, its control systems and operations
  • Design security-oriented architectures, network segmentation, and security support services
  • Configure event monitoring systems, anti-malware applications, and endpoint security
  • Gain knowledge of ICS risks, threat detection, and access management
  • Learn about patch management and life cycle management
  • Secure your industrial control systems from design through retirement

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Oct 18, 2017
Length: 456 pages
Edition : 1st
Language : English
ISBN-13 : 9781788395151
Category :
Concepts :

What do you get with a Packt Subscription?

Free for first 7 days. $19.99 p/m after that. Cancel any time!
Product feature icon Unlimited ad-free access to the largest independent learning library in tech. Access this title and thousands more!
Product feature icon 50+ new titles added per month, including many first-to-market concepts and exclusive early access to books as they are being written.
Product feature icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Product feature icon Thousands of reference materials covering every tech concept you need to stay up to date.
Subscribe now
View plans & pricing

Product Details

Publication date : Oct 18, 2017
Length: 456 pages
Edition : 1st
Language : English
ISBN-13 : 9781788395151
Category :
Concepts :

Packt Subscriptions

See our plans and pricing
Modal Close icon
€18.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
€189.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts
€264.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just €5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total 94.97 200.97 106.00 saved
Cybersecurity Attacks (Red Team Activity)
€8.99 €114.99
Industrial Cybersecurity
€47.99
Cybersecurity - Attack and Defense Strategies
€37.99
Total 94.97 200.97 106.00 saved Stars icon
Banner background image

Table of Contents

12 Chapters
Industrial Control Systems Chevron down icon Chevron up icon
Insecure by Inheritance Chevron down icon Chevron up icon
Anatomy of an ICS Attack Scenario Chevron down icon Chevron up icon
Industrial Control System Risk Assessment Chevron down icon Chevron up icon
The Purdue Model and a Converged Plantwide Ethernet Chevron down icon Chevron up icon
The Defense-in-depth Model Chevron down icon Chevron up icon
Physical ICS Security Chevron down icon Chevron up icon
ICS Network Security Chevron down icon Chevron up icon
ICS Computer Security Chevron down icon Chevron up icon
ICS Application Security Chevron down icon Chevron up icon
ICS Device Security Chevron down icon Chevron up icon
The ICS Cybersecurity Program Development Process Chevron down icon Chevron up icon

Customer reviews

Top Reviews
Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.8
(12 Ratings)
5 star 83.3%
4 star 8.3%
3 star 8.3%
2 star 0%
1 star 0%
Filter icon Filter
Top Reviews

Filter reviews by




Dr. Larry Leibrock Dec 12, 2018
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Very fine overview of a complex set of topics dealing with both IT and OT. The book is useful in that it provides terms of art, and contexts for industrial cyber security topics. The only glaring issues are the absence of both incident response and forensics post intrusion. Get this book if you are getting in the industrial cyber business
Amazon Verified review Amazon
Lee A Carter Jan 04, 2022
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Well balanced book, some of the content is a little dated in parts but if you take the spirit of what is being said and translate this into todays Windows technology then thats fine. This isn't the silver bullet and the only resource you should have in your library, however it is a really good foundation and a great set of role plays in the later chapters.
Amazon Verified review Amazon
George R. Clark Nov 15, 2017
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Having had experience with Industrial Control Systems (ICS) and their security, I approached the book as a review – been there done that I thought. Instead, after re-visiting the history of how ICS evolved to its current insecure state, I found myself engaged in a mystery. How the structure of an ICS attack progressed from a seemingly innocent email to the potential of malicious control over the entire facility. The conversational prose of this page turner made me acutely aware that my prior experience was insufficient per the deep skills and knowledge needed to mount an effective defense. That unease was quickly remedied. The chapters that followed provided details, references, step-by-step procedures, and suggested deep learning while documenting how to secure and protect an ICS and develop an ongoing Cybersecurity program.The epiphany for me was that Cybersecurity has to become ingrained in the corporate culture similar to Safety. The Electrical and Instrument technicians of tomorrow need the knowledge Industrial Cybersecurity can provide. Industrial Cybersecurity is a perfect text. It’s depth of detail and the well defined lab exercises would readily establish the basis of an advanced course.George R. Clark
Amazon Verified review Amazon
P~ Jan 08, 2018
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This book provides a wealth of valuable information for Cybersecurity professionals with IT-only experience, control system engineers who are delving into security, or it could serve as a good reference for seasoned Industrial Control System (ICS) Security Engineers and Consultants. The practical, hands-on approach utilized in this book makes it accessible to newcomers in this field, thereby allowing them to gain a solid foundation of the ICS security concepts through lab related exercises. Given the criticality of most ICS production environments, an aspiring ICS security engineer simply does not have the luxury of learning through experimentation within a production environment (due to the potential of disrupting process operations and causing real-world implications). Therefore, the demonstration based learning approach utilized in this book offers an effective means of solidifying security concepts and evaluating distinct behaviors or ICS-specific protocols using packet analysis tools such as Wireshark.Although no single book can cover the vast amount of knowledge that is required to design and implement secure ICS systems, I think this book provides a sound primer and multi-tiered design approach to address ICS security holistically in the face of many dynamic cyber threats. As an ICS Security Consultant myself, I am pleased with the breadth of information contained in this book and how the author shared his security knowledge and experience in a practical way. The ICS community of security professionals is relatively small when compared to the overall number of professionals within the Cyber Security discipline. However, though knowledge sharing and dissemination of content such as this book, I think we will continue to make progressive steps forward to safeguard ICS assets and minimize the potential of businesses being severely impacted by security vulnerabilities.
Amazon Verified review Amazon
Eduard Polyakov Nov 03, 2017
Full star icon Full star icon Full star icon Full star icon Full star icon 5
This is a very well written book on a subject that should be of interest to any network and security professional as well as engineers in charge of manufacturing plants and critical infrastructure systems. We are all aware of recent security breaches at companies who supposed to be at the leading edge of security. Now imagine a typical manufacturing plant or public utility system with network infrastructure and technologies years behind and not enough knowledgeable people to support.I think this book can help to educate about industrial security problems, and more importantly show concrete steps, methods and tools to improve the situation. It also shows some of the inherent limitations of the industrial systems and why you cannot secure them in the same way (or as quickly) as IT systems. A lot of details and practical examples.I liked chapter 4 the most (Risk assessment), gives you tools to select and prioritize risk mitigations. Chapter 3 (example of an attack) is just fun to read! Chapter 2 goes pretty deep into ICS protocols details - security by obscurity is not valid argument, don't need to be a foreign government agent to hack these things. A lot of attention is paid to concepts of segmentation and zone security as well as defense in depth.Overall I must say this is a great book for any security professional as well as control engineers and plant managers.
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

What is included in a Packt subscription? Chevron down icon Chevron up icon

A subscription provides you with full access to view all Packt and licnesed content online, this includes exclusive access to Early Access titles. Depending on the tier chosen you can also earn credits and discounts to use for owning content

How can I cancel my subscription? Chevron down icon Chevron up icon

To cancel your subscription with us simply go to the account page - found in the top right of the page or at https://subscription.packtpub.com/my-account/subscription - From here you will see the ‘cancel subscription’ button in the grey box with your subscription information in.

What are credits? Chevron down icon Chevron up icon

Credits can be earned from reading 40 section of any title within the payment cycle - a month starting from the day of subscription payment. You also earn a Credit every month if you subscribe to our annual or 18 month plans. Credits can be used to buy books DRM free, the same way that you would pay for a book. Your credits can be found in the subscription homepage - subscription.packtpub.com - clicking on ‘the my’ library dropdown and selecting ‘credits’.

What happens if an Early Access Course is cancelled? Chevron down icon Chevron up icon

Projects are rarely cancelled, but sometimes it's unavoidable. If an Early Access course is cancelled or excessively delayed, you can exchange your purchase for another course. For further details, please contact us here.

Where can I send feedback about an Early Access title? Chevron down icon Chevron up icon

If you have any feedback about the product you're reading, or Early Access in general, then please fill out a contact form here and we'll make sure the feedback gets to the right team. 

Can I download the code files for Early Access titles? Chevron down icon Chevron up icon

We try to ensure that all books in Early Access have code available to use, download, and fork on GitHub. This helps us be more agile in the development of the book, and helps keep the often changing code base of new versions and new technologies as up to date as possible. Unfortunately, however, there will be rare cases when it is not possible for us to have downloadable code samples available until publication.

When we publish the book, the code files will also be available to download from the Packt website.

How accurate is the publication date? Chevron down icon Chevron up icon

The publication date is as accurate as we can be at any point in the project. Unfortunately, delays can happen. Often those delays are out of our control, such as changes to the technology code base or delays in the tech release. We do our best to give you an accurate estimate of the publication date at any given time, and as more chapters are delivered, the more accurate the delivery date will become.

How will I know when new chapters are ready? Chevron down icon Chevron up icon

We'll let you know every time there has been an update to a course that you've bought in Early Access. You'll get an email to let you know there has been a new chapter, or a change to a previous chapter. The new chapters are automatically added to your account, so you can also check back there any time you're ready and download or read them online.

I am a Packt subscriber, do I get Early Access? Chevron down icon Chevron up icon

Yes, all Early Access content is fully available through your subscription. You will need to have a paid for or active trial subscription in order to access all titles.

How is Early Access delivered? Chevron down icon Chevron up icon

Early Access is currently only available as a PDF or through our online reader. As we make changes or add new chapters, the files in your Packt account will be updated so you can download them again or view them online immediately.

How do I buy Early Access content? Chevron down icon Chevron up icon

Early Access is a way of us getting our content to you quicker, but the method of buying the Early Access course is still the same. Just find the course you want to buy, go through the check-out steps, and you’ll get a confirmation email from us with information and a link to the relevant Early Access courses.

What is Early Access? Chevron down icon Chevron up icon

Keeping up to date with the latest technology is difficult; new versions, new frameworks, new techniques. This feature gives you a head-start to our content, as it's being created. With Early Access you'll receive each chapter as it's written, and get regular updates throughout the product's development, as well as the final course as soon as it's ready.We created Early Access as a means of giving you the information you need, as soon as it's available. As we go through the process of developing a course, 99% of it can be ready but we can't publish until that last 1% falls in to place. Early Access helps to unlock the potential of our content early, to help you start your learning when you need it most. You not only get access to every chapter as it's delivered, edited, and updated, but you'll also get the finalized, DRM-free product to download in any format you want when it's published. As a member of Packt, you'll also be eligible for our exclusive offers, including a free course every day, and discounts on new and popular titles.