Have a personal or library account? Click
here
to login
Paradigm
reference-global.com
Content
Services
Paradigm
Partners
Contact
Books
Industrial Cybersecurity
Industrial Cybersecurity
Efficiently monitor the cybersecurity posture of your ICS environment
Publisher:
Packt Publishing Limited
By:
Pascal Ackerman
Paid access
|
Oct 2021
Product purchase options
E-Book
€32.99
Institutions
€135.95
Product purchase options
E-Book
€32.99
Institutions
€135.95
Description
Table of contents
Authors
Resources
Metrics
Loading...
Table of Contents
Introduction and Recap of First Edition
A Modern Look at the Industrial Control System Architecture
The Industrial Demilitarized Zone
Designing the ICS Architecture with Security in Mind
Introduction to Security Monitoring
Passive Security Monitoring
Active Security Monitoring
Industrial Threat Intelligence
Visualizing, Correlating, and Alerting
Threat Hunting
Threat Hunt Scenario 1 – Malware Beaconing
Threat Hunt Scenario 2 – Finding Malware and Unwanted Applications
Threat Hunt Scenario 3 – Suspicious External Connections
Different Types of Cybersecurity Assessments
Industrial Control System Risk Assessments
Red Team/Blue Team Exercises
Penetration Testing ICS Environments
Incident Response for the ICS Environment
Lab Setup
Loading...
Loading...
Loading...
PDF ISBN:
978-1-80020-582-6
Publisher:
Packt Publishing Limited
Copyright owner:
© 2021 Packt Publishing Limited
Publication date:
2021
Language:
English
Pages:
800
Related subjects:
Computer sciences
,
Computer sciences, other
People also read
Publications carousel
Previous slide
Next slide
Book
Industrial Cybersecurity
Ackerman, Pascal
Book
Practical Industrial Internet of Things Security
Bhattacharjee, Sravani
Book
Securing Industrial Control Systems and Safety Instrumented Systems
Bouhdada, Jalal
,
Ayala, Marco
Book
The Cybersecurity Playbook for Modern Enterprises
Wittkop, Jeremy
Book
Ethically hacking an industrial control system
Ferrone, Sharon
Book
Modern Cybersecurity Strategies for Enterprises
Mishra, Ashish
Book
Cybersecurity – Attack and Defense Strategies, 3rd edition
Diogenes, Yuri
,
Ozkaya, Dr. Erdal
Book
Infosec Strategies and Best Practices
MacMillan, Joseph
Book
Critical Infrastructure Security
Toledano, Soledad Antelada
Book
Mastering Cyber Intelligence
Dahj, Jean Nestor M.