Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Industrial Cybersecurity
Industrial Cybersecurity

Industrial Cybersecurity: Efficiently secure critical infrastructure systems

eBook
$34.98 $49.99
Paperback
$62.99
Subscription
Free Trial
Renews at $19.99p/m

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning
Table of content icon View table of contents Preview book icon Preview Book

Industrial Cybersecurity

Insecure by Inheritance

After last chapter's high-level explanation of what an Industrial control system (ICS) is, what it does, and what it is made of, let's start with a deep dive into a select set of technologies that can be found in most Industrial controls systems and examine some of the vulnerabilities or weaknesses that these technologies have.

In this chapter, we will cover the following topics:

  • The Industrial control system history.
  • The Industrial communication protocols with particular attention to:
    • PROFINET
    • EtherNet/IP
    • Common Industrial protocol
    • Ethernet
    • Modbus TCP/IP
  • Common IT protocols found in the ICS

Industrial control system history

Way back, before Programmable Logic Controllers (PLCs) became the norm, plant floor automation was performed with racks and racks of industrial relays, pneumatic plunger timers, and electromagnetically counters to control the starting and stopping of motors, opening of valves, and other control-related process interactions. The program that ran the control for such a setup was not a program at all but a combination of interconnected circuits, timers, and relays. By forming the electrical paths, physical actions such as opening valves, running motors, and turning on lights were accomplished. The programmer of a relay system like this was the plant floor electrical engineer and program changes involved physically changing the electrical circuits. There was no programmer's Terminal or interface to connect to and there weren&apos...

Modbus and Modbus TCP/IP

Introduced in 1979, Modbus has been the de facto standard ever since. Modbus is an application layer messaging protocol. Placed at level 7 of the OSI model, it provides client/server communication between devices connected via different types of communication buses or communication media. Modbus is the most widely used ICS protocol, mainly because it's a proven and reliable protocol, simple to implement, and open to use without any royalties:

On the left-hand side in the preceding figure, we see Modbus communicating over serial (RS-232 or RS-485). The same application layer protocol is used for communicating over Ethernet, as shown on the right-hand side.

The Modbus protocol is built upon a request and reply model. It uses Function Code in combination with a data section. The Function Code specifies which service is requested for or responded to...

PROFINET

Process Field Net, or PROFINET, is an industry technical standard in accordance with IEC 61784-2. It is used for data communication over Industrial Ethernet and designed for collecting data from, and controlling of, equipment in Industrial systems with delivery time approaching of 1 ms. The standard is maintained and supported by PROFIBUS & PROFINET International (PI), an umbrella organization headquartered in Karlsruhe, Germany.

PROFINET shouldn't be confused with PROFIBUS, which is a fieldbus communication standard for real-time automation purposes, first introduced in 1989 by the German department of education and research and later adopted by Siemens. The following diagram shows the specific place in the Industrial control system for each protocol:

 

PROFINET supports Ethernet, HART, ISA100, and Wi-Fi, as well as legacy buses found on older...

Common IT protocols found in the ICS

Although not directly industrial control protocols by themselves, the upcoming sections are a list of common IT protocols that can be found on OT networks. The list includes a summarization of their well-known vulnerabilities.

HTTP

Many ICS devices will have built-in diagnostic web pages and some form of web server to allow access to the diagnostic pages. HTTP is known to have the following vulnerabilities:

  • Vulnerable HTTP server application code
  • Hard coded credentials
  • SQL injection
  • Cross-site scripting
  • Broken authentication and session management
  • Insecure direct object references
  • Cross-site request forgery
  • Security misconfiguration
  • Insecure cryptographic storage
  • Failure to restrict URL...

Summary

This chapter covers only some of the vulnerabilities found in only some of the industrial protocols out there. There are many more protocols and many more vulnerabilities and exploitation methods we could discuss, probably filling an entire book by itself. I choose the protocols that did make the chapter based on their prevalence out on the ICS networks in plants and factories. Then, I picked the most obvious vulnerabilities for those protocols. As it turns out, these vulnerabilities are also easy to exploit. This is the state of affairs ICS security is in, unfortunately. Apart from one or two extremely well-funded attacks, most ICS (OT) breaches use attack vectors that were eliminated from IT networks ages ago. A recently discovered malware campaign is a great example of this. The malware that took down the Ukrainian power grid in 2015 was first believed to be a...

Left arrow icon Right arrow icon

Key benefits

  • Learn about endpoint protection such as anti-malware implementation, updating, monitoring, and sanitizing user workloads and mobile devices
  • Filled with practical examples to help you secure critical infrastructure systems efficiently
  • A step-by-step guide that will teach you the techniques and methodologies of building robust infrastructure systems

Description

With industries expanding, cyber attacks have increased significantly. Understanding your control system’s vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security measures necessary to protect critical infrastructure systems and will get you up to speed with identifying unique challenges.Industrial cybersecurity begins by introducing Industrial Control System (ICS) technology, including ICS architectures, communication media, and protocols. This is followed by a presentation on ICS (in) security. After presenting an ICS-related attack scenario, securing of the ICS is discussed, including topics such as network segmentation, defense-in-depth strategies, and protective solutions. Along with practical examples for protecting industrial control systems, this book details security assessments, risk management, and security program development. It also covers essential cybersecurity aspects, such as threat detection and access management. Topics related to endpoint hardening such as monitoring, updating, and anti-malware implementations are also discussed.

Who is this book for?

If you are a security professional and want to ensure a robust environment for critical infrastructure systems, this book is for you. IT professionals interested in getting into the cyber security domain or who are looking at gaining industrial cyber security certifications will also find this book useful.

What you will learn

  • Understand industrial cybersecurity, its control systems and operations
  • Design security-oriented architectures, network segmentation, and security support services
  • Configure event monitoring systems, anti-malware applications, and endpoint security
  • Gain knowledge of ICS risks, threat detection, and access management
  • Learn about patch management and life cycle management
  • Secure your industrial control systems from design through retirement

Product Details

Country selected
Publication date, Length, Edition, Language, ISBN-13
Publication date : Oct 18, 2017
Length: 456 pages
Edition : 1st
Language : English
ISBN-13 : 9781788395984
Category :
Concepts :

What do you get with eBook?

Product feature icon Instant access to your Digital eBook purchase
Product feature icon Download this book in EPUB and PDF formats
Product feature icon Access this title in our online reader with advanced features
Product feature icon DRM FREE - Read whenever, wherever and however you want
Product feature icon AI Assistant (beta) to help accelerate your learning

Product Details

Publication date : Oct 18, 2017
Length: 456 pages
Edition : 1st
Language : English
ISBN-13 : 9781788395984
Category :
Concepts :

Packt Subscriptions

See our plans and pricing
Modal Close icon
$19.99 billed monthly
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Simple pricing, no contract
$199.99 billed annually
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts
$279.99 billed in 18 months
Feature tick icon Unlimited access to Packt's library of 7,000+ practical books and videos
Feature tick icon Constantly refreshed with 50+ new titles a month
Feature tick icon Exclusive Early access to books as they're written
Feature tick icon Solve problems while you work with advanced search and reference features
Feature tick icon Offline reading on the mobile app
Feature tick icon Choose a DRM-free eBook or Video every month to keep
Feature tick icon PLUS own as many other DRM-free eBooks or Videos as you like for just $5 each
Feature tick icon Exclusive print discounts

Frequently bought together


Stars icon
Total $ 250.97
Cybersecurity Attacks (Red Team Activity)
$137.99
Industrial Cybersecurity
$62.99
Cybersecurity - Attack and Defense Strategies
$49.99
Total $ 250.97 Stars icon

Table of Contents

12 Chapters
Industrial Control Systems Chevron down icon Chevron up icon
Insecure by Inheritance Chevron down icon Chevron up icon
Anatomy of an ICS Attack Scenario Chevron down icon Chevron up icon
Industrial Control System Risk Assessment Chevron down icon Chevron up icon
The Purdue Model and a Converged Plantwide Ethernet Chevron down icon Chevron up icon
The Defense-in-depth Model Chevron down icon Chevron up icon
Physical ICS Security Chevron down icon Chevron up icon
ICS Network Security Chevron down icon Chevron up icon
ICS Computer Security Chevron down icon Chevron up icon
ICS Application Security Chevron down icon Chevron up icon
ICS Device Security Chevron down icon Chevron up icon
The ICS Cybersecurity Program Development Process Chevron down icon Chevron up icon

Customer reviews

Most Recent
Rating distribution
Full star icon Full star icon Full star icon Full star icon Half star icon 4.8
(12 Ratings)
5 star 83.3%
4 star 8.3%
3 star 8.3%
2 star 0%
1 star 0%
Filter icon Filter
Most Recent

Filter reviews by




Giulio Aug 23, 2023
Full star icon Full star icon Full star icon Empty star icon Empty star icon 3
I'm a pentester who is trying to learn more about OT and ICS security, and this is one of the books I was recommended. While the author does a good job explaining the concepts and the notions mentioned on how to defend ICS networks, I was hoping to see more about pentesting this kind of environments. There is a chapter about an attack scenario, in this chapter the author is meticulous in showing how to set up a web page to deliver a payload exploiting a Java vulnerability from 2012, shows really long Metasploit module outputs and how to bypass UAC or become SYSTEM on a Windows workstation, as well as finding cached clear text passwords with mimikatz, using psexec, VNC inject, autoroute... all this to then come to a sudden halt when the actual OT network is reached. When the interesting phase of an ICS attack is supposed to begin the author mentions one possible attack against an HMI and the chapter ends, no other attack scenarios will be examined.This is a valuable resource if you are interested in defending am ICS, if you are an offensive security specialist looking for info on possible attack vectors and tools there won't be much to be gained besides the chapter on network protocols, which is interesting and mentions quite a few tools to play with and to build a little virtual lab.
Amazon Verified review Amazon
Marco Andreini Jul 01, 2023
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Per chi come me non si è mai occupato di sicurezza e OT questo libro aiuta a gettare le basi in modo chiaro ed esaustivo
Amazon Verified review Amazon
Lee A Carter Jan 04, 2022
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Well balanced book, some of the content is a little dated in parts but if you take the spirit of what is being said and translate this into todays Windows technology then thats fine. This isn't the silver bullet and the only resource you should have in your library, however it is a really good foundation and a great set of role plays in the later chapters.
Amazon Verified review Amazon
Narasimha Sep 10, 2020
Full star icon Full star icon Full star icon Full star icon Full star icon 5
Very good
Amazon Verified review Amazon
Amazon カスタマー Jul 04, 2019
Full star icon Full star icon Full star icon Full star icon Empty star icon 4
The book depicts both the 'big picture' and the 'down-to-Earth' aspects of industrial cybersecurity
Amazon Verified review Amazon
Get free access to Packt library with over 7500+ books and video courses for 7 days!
Start Free Trial

FAQs

How do I buy and download an eBook? Chevron down icon Chevron up icon

Where there is an eBook version of a title available, you can buy it from the book details for that title. Add either the standalone eBook or the eBook and print book bundle to your shopping cart. Your eBook will show in your cart as a product on its own. After completing checkout and payment in the normal way, you will receive your receipt on the screen containing a link to a personalised PDF download file. This link will remain active for 30 days. You can download backup copies of the file by logging in to your account at any time.

If you already have Adobe reader installed, then clicking on the link will download and open the PDF file directly. If you don't, then save the PDF file on your machine and download the Reader to view it.

Please Note: Packt eBooks are non-returnable and non-refundable.

Packt eBook and Licensing When you buy an eBook from Packt Publishing, completing your purchase means you accept the terms of our licence agreement. Please read the full text of the agreement. In it we have tried to balance the need for the ebook to be usable for you the reader with our needs to protect the rights of us as Publishers and of our authors. In summary, the agreement says:

  • You may make copies of your eBook for your own use onto any machine
  • You may not pass copies of the eBook on to anyone else
How can I make a purchase on your website? Chevron down icon Chevron up icon

If you want to purchase a video course, eBook or Bundle (Print+eBook) please follow below steps:

  1. Register on our website using your email address and the password.
  2. Search for the title by name or ISBN using the search option.
  3. Select the title you want to purchase.
  4. Choose the format you wish to purchase the title in; if you order the Print Book, you get a free eBook copy of the same title. 
  5. Proceed with the checkout process (payment to be made using Credit Card, Debit Cart, or PayPal)
Where can I access support around an eBook? Chevron down icon Chevron up icon
  • If you experience a problem with using or installing Adobe Reader, the contact Adobe directly.
  • To view the errata for the book, see www.packtpub.com/support and view the pages for the title you have.
  • To view your account details or to download a new copy of the book go to www.packtpub.com/account
  • To contact us directly if a problem is not resolved, use www.packtpub.com/contact-us
What eBook formats do Packt support? Chevron down icon Chevron up icon

Our eBooks are currently available in a variety of formats such as PDF and ePubs. In the future, this may well change with trends and development in technology, but please note that our PDFs are not Adobe eBook Reader format, which has greater restrictions on security.

You will need to use Adobe Reader v9 or later in order to read Packt's PDF eBooks.

What are the benefits of eBooks? Chevron down icon Chevron up icon
  • You can get the information you need immediately
  • You can easily take them with you on a laptop
  • You can download them an unlimited number of times
  • You can print them out
  • They are copy-paste enabled
  • They are searchable
  • There is no password protection
  • They are lower price than print
  • They save resources and space
What is an eBook? Chevron down icon Chevron up icon

Packt eBooks are a complete electronic version of the print edition, available in PDF and ePub formats. Every piece of content down to the page numbering is the same. Because we save the costs of printing and shipping the book to you, we are able to offer eBooks at a lower cost than print editions.

When you have purchased an eBook, simply login to your account and click on the link in Your Download Area. We recommend you saving the file to your hard drive before opening it.

For optimal viewing of our eBooks, we recommend you download and install the free Adobe Reader version 9.