Free shipping on orders over $99
Industrial Cybersecurity

Industrial Cybersecurity

Efficiently secure critical infrastructure systems

by Pascal Ackerman
Paperback
Publication Date: 18/10/2017

Share This Book:

  $68.19
or 4 easy payments of $17.05 with
afterpay
Your one-step guide to understanding industrial cyber security, its control systems, and its operations.

About This Book

* Learn about endpoint protection such as anti-malware implementation, updating, monitoring, and sanitizing user workloads and mobile devices
* Filled with practical examples to help you secure critical infrastructure systems efficiently
* A step-by-step guide that will teach you the techniques and methodologies of building robust infrastructure systems

Who This Book Is For

If you are a security professional and want to ensure a robust environment for critical infrastructure systems, this book is for you. IT professionals interested in getting into the cyber security domain or who are looking at gaining industrial cyber security certifications will also find this book useful.

What You Will Learn

* Understand industrial cybersecurity, its control systems and operations
* Design security-oriented architectures, network segmentation, and security support services
* Configure event monitoring systems, anti-malware applications, and endpoint security
* Gain knowledge of ICS risks, threat detection, and access management
* Learn about patch management and life cycle management
* Secure your industrial control systems from design through retirement

In Detail

With industries expanding, cyber attacks have increased significantly. Understanding your control system's vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is increasingly important. With the help of real-world use cases, this book will teach you the methodologies and security measures necessary to protect critical infrastructure systems and will get you up to speed with identifying unique challenges.Industrial cybersecurity begins by introducing Industrial Control System (ICS) technology, including ICS architectures, communication media, and protocols. This is followed by a presentation on ICS (in) security. After presenting an ICS-related attack scenario, securing of the ICS is discussed, including topics such as network segmentation, defense-in-depth strategies, and protective solutions. Along with practical examples for protecting industrial control systems, this book details security assessments, risk management, and security program development. It also covers essential cybersecurity aspects, such as threat detection and access management. Topics related to endpoint hardening such as monitoring, updating, and anti-malware implementations are also discussed.

Style and approach

A step-by-step guide to implement Industrial Cyber Security effectively.
ISBN:
9781788395151
9781788395151
Category:
Computer security
Format:
Paperback
Publication Date:
18-10-2017
Publisher:
Packt Publishing Limited
Country of origin:
United Kingdom
Pages:
456
Dimensions (mm):
235x191mm

This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 2 - 3 weeks of you placing an order.

Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.

Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:

ACT Metro: 2 working days
NSW Metro: 2 working days
NSW Rural: 2-3 working days
NSW Remote: 2-5 working days
NT Metro: 3-6 working days
NT Remote: 4-10 working days
QLD Metro: 2-4 working days
QLD Rural: 2-5 working days
QLD Remote: 2-7 working days
SA Metro: 2-5 working days
SA Rural: 3-6 working days
SA Remote: 3-7 working days
TAS Metro: 3-6 working days
TAS Rural: 3-6 working days
VIC Metro: 2-3 working days
VIC Rural: 2-4 working days
VIC Remote: 2-5 working days
WA Metro: 3-6 working days
WA Rural: 4-8 working days
WA Remote: 4-12 working days

Reviews

Be the first to review Industrial Cybersecurity.