国产第1页_91在线亚洲_中文字幕成人_99久久久久久_五月宗合网_久久久久国产一区二区三区四区

讀書月攻略拿走直接抄!
歡迎光臨中圖網(wǎng) 請 | 注冊

包郵 工業(yè)網(wǎng)絡(luò)安全

出版社:東南大學(xué)出版社出版時間:2018-10-01
開本: 24cm 頁數(shù): 440頁
中 圖 價:¥74.3(7.5折) 定價  ¥99.0 登錄后可看到會員價
加入購物車 收藏
開年大促, 全場包郵
?新疆、西藏除外
本類五星書更多>

工業(yè)網(wǎng)絡(luò)安全 版權(quán)信息

工業(yè)網(wǎng)絡(luò)安全 內(nèi)容簡介

  《工業(yè)網(wǎng)絡(luò)安全(影印版)》首先介紹了工業(yè)控制系統(tǒng)(ICS)技術(shù),包括芯片的體系結(jié)構(gòu)、通信媒介和協(xié)議。在介紹了ICS相關(guān)的攻擊場景之后,討論了ICS的安全性,包括網(wǎng)絡(luò)分割、縱深防御策略和保護解決方案等主題。除了保護工業(yè)控制系統(tǒng)的實際例子外,本書還詳細(xì)介紹了安全評估、風(fēng)險管理和安全程序開發(fā)。它還涵蓋了網(wǎng)絡(luò)安全方面的內(nèi)容,如威脅檢測和訪問管理,討論了與端點硬化相關(guān)的主題,如監(jiān)視、更新和反惡意軟件實現(xiàn)。

工業(yè)網(wǎng)絡(luò)安全 目錄

Preface Chapter 1: Industrial Control Systems An overview of an Industrial control system The view function The monitor function The control function The Industrial control system architecture Programmable logic controllers Human Machine Interface Supervisory Control and Data Acquisition Distributed control system Safety instrumented system The Purdue model for Industrial control systems The enterprise zone Level 5 - Enterprise network Level 4 - Site business planning and logistics Industrial Demilitarized Zone The manufacturing zone Level 3 - Site operations Level 2 - Area supervisory control Level 1 - Basic control Level 0 - Process Industrial control system communication media and protocols Regular information technology network protocols Process automation protocols Industrial control system protocols Building automation protocols Automatic meter reading protocols Communication protocols in the enterprise zone Communication protocols in the Industrial zone Summary Chapter 2: Insecure by Inheritance Industrial control system history Modbus and Modbus TCP/IP Breaking Modbus Using Python and Scapy to communicate over Modbus Replaying captured Modbus packets PROFINET PROFINET packet replay attacks $7 communication and the stop CPU vulnerability EtherNet/IP and the Common Industrial Protocol Shodan: The scariest search engine on the internet Common IT protocols found in the ICS HTTP File Transfer Protocol Telnet Address Resolution Protocol ICMP echo request Summary Chapter 3: Anatomy of an ICS Attack Scenario Setting the stage The Slumbertown paper mill Trouble in paradise Building a virtual test network Clicking our heels What can the attacker do with their access The cyber kill chain Phase two of the Slumbertown Mill ICS attack Other attack scenarios Summary Chapter 4: Industrial Control System Risk Assessment Attacks, objectives, and consequences Risk assessments A risk assessment example Step 1 - Asset identification and system characterization Step 2 - Vulnerability identification and threat modeling Discovering vulnerabilities Threat modeling Step 3 - Risk calculation and mitigation Summary Chapter 5: The Purdue Model and a Converged Plantwide Ethernet The Purdue Enterprise Reference Architecture The Converged Plantwide Enterprise The safety zone Cell/area zones Level 0 - The process Level 1 - Basic control Level 2 - Area supervisory control The manufacturing zone Level 3 - Site manufacturing operations and control The enterprise zone Level 4 - Site business planning and logistics Level 5 - Enterprise Level 3.5 - The Industrial Demilitarized Zone The CPwE industrial network security framework Summary Chapter 6: The Defense-in-depth Model ICS security restrictions How to go about defending an ICS The ICS is extremely defendable The defense-in-depth model Physical security Network security Computer security Application security Device security Policies, procedures, and awareness Summary Chapter 7: Physical ICS Security The ICS security bubble analogy Segregation exercise Down to it - Physical security Summary Chapter 8: ICS Network Security Designing network architectures for security Network segmentation The Enterprise Zone The Industrial Zone Cell Area Zones Level 3 site operations The Industrial Demilitarized Zone Communication conduits Resiliency and redundancy Architectural overview Firewalls Configuring the active-standby pair of firewalls Security monitoring and logging Network packet capturing Event logging Security information and event management Firewall logs Configuring the Cisco ASA firewall to send log data to the OSSIM server Setting the syslog logging level for Cisco devices Network intrusion detection logs Why not intrusion prevention Configuring the Cisco Sourcefire IDS to send log data to the OSSIM server Router and switch logs Configuring Cisco lOS to log to the syslog service of the OSSIM server Operating system logs Collecting logs from a Windows system Installing and configuring NXLog CE across your Windows hosts Application logs Reading an application log file with an HIDS agent on Windows Network visibility Summary Chapter 9: ICS Computer Security Endpoint hardening Narrowing the attack surface Limiting the impact of a compromise Microsoft Enhanced Mitigation Experience Toolkit Configuring EMET for a Rockwell Automation application server Microsoft AppLocker Microsoft AppLocker configuration Configuration and change management Patch management Configuring Microsoft Windows Server Update Services for the industrial zone Configuring the Cisco ASA firewall Creating the Windows Server Update Services server Configuring Windows client computers to get updates from the WSUS server Endpoint protection software Host-based firewalls Anti-malware software Types of malware Application whitelisting software Application whitelisting versus blacklisting How application whitelisting works Symantec's Embedded Security: Critical system protection Building the Symantec's Embedded Security: Critical System Protection management server Monitoring and logging Summary Chapter 10: ICS Application Security Application security Input validation vulnerabilities Software tampering Authentication vulnerabilities Authorization vulnerabilities Insecure configuration vulnerabilities Session management vulnerabilities Parameter manipulation vulnerabilities Application security testing OpenVAS security scan ICS application patching ICS secure SDLC The definition of secure SDLC Summary Chapter 11: ICS Device Security ICS device hardening ICS device patching The ICS device life cycle ICS device security considerations during the procurement phase ICS device security considerations during the installation phase ICS device security considerations during the operation phase ICS device security considerations for decommissioning and disposal Summary Chapter 12: The ICS Cybersecurity Program Development Process The NIST Guide to Industrial control systems security Obtaining senior management buy-in Building and training a cross-functional team Defining charter and scope Defining ICS-specific security policies and procedures Implementing an ICS security risk-management framework Categorizing ICS systems and network assets Selecting ICS security controls Performing (initial) risk assessment Implementing the security controls The ICS security program development process Security policies, standards, guidelines, and procedures Defining ICS-specific security policies, standards, and procedures Defining and inventorying the ICS assets Performing an initial risk assessment on discovered ICS assets The Slumbertown Paper Mill initial risk assessment Defining and prioritizing mitigation activities Defining and kicking off the security improvement cycle Summary Index
展開全部

工業(yè)網(wǎng)絡(luò)安全 作者簡介

帕斯卡·阿克曼(Pascal Ackerman) is a seasoned industrial security professional with a degree in electrical engineering and over 15 years of experience in designing, troubleshooting, and securing large-scale industrial control systems and the various types of network technologies they utilize. After more than a decade of hands-on, in-the-field experience, he joined Rockwell Automation in 2015 and is currently employed as Senior Consultant of Industrial Cybersecurity with the Network and Security Services Group. He recently became a digital nomad and now travels the world with his family while fighting cyber adversaries.

商品評論(0條)
暫無評論……
書友推薦
本類暢銷
編輯推薦
返回頂部
中圖網(wǎng)
在線客服
主站蜘蛛池模板: 一级做a爰黑人又硬又粗视 一级做a爰片 | 999热在线精品观看全部 | 老司机在线精品视频免费看 | 在线欧美不卡 | 午夜日韩在线 | 国产精品视频一区国模私拍 | 欧美福利精品福利视频在线观看 | 成人看片毛片免费播放器 | 国产精品乱码在线观看 | 那里有黄色网址 | 亚洲成人在线免费视频 | 99色在线 | 蝴蝶色综合综合成人网 | 国产三级精品三级在专区 | 亚洲精品久久久久国色天香 | 狠狠夜色午夜久久综合热91 | av大片在线无码永久免费 | 亚洲精品久久久久成人2007 | 亚洲精品免费日日日夜夜夜夜 | 在线看片免费人成视频电影 | 肥臀浪妇太爽了快点再快点 | 中文字幕亚洲一区 | 色综合色综合色综合色综合 | 成av人电影在线观看 | 琪琪电影午夜理论片八戒八戒 | 国产亚洲精品久久久久久久网站 | 久久久久久久久久久久久9999 | 国产视频日本 | 色欲精品国产一区二区三区av | 做爰成人五级在线视频| 爽爽精品dvd蜜桃成熟时电影院 | 中文国产成人精品久久不卡 | 中文天堂国产最新 | 免费人成年短视频在线观看网站 | 亚洲色域网 | 午夜免费视频网站 | 国产一区二区三区四区五区 | 久久精品一区二区免费看 | 极品美女一级毛片免费 | 美女隐私视频网站 | 亚洲av无码一区东京热久久 |