LEADER 04350nam 22006135 450 001 9910349285603321 005 20200703074158.0 010 $a3-030-18214-2 024 7 $a10.1007/978-3-030-18214-4 035 $a(CKB)4100000009152906 035 $a(MiAaPQ)EBC5888893 035 $a(DE-He213)978-3-030-18214-4 035 $a(PPN)260303291 035 $a(EXLCZ)994100000009152906 100 $a20190829d2019 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aIndustrial Control Systems Security and Resiliency$b[electronic resource] $ePractice and Theory /$fedited by Craig Rieger, Indrajit Ray, Quanyan Zhu, Michael A. Haney 205 $a1st ed. 2019. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2019. 215 $a1 online resource (277 pages) 225 1 $aAdvances in Information Security,$x1568-2633 ;$v75 311 $a3-030-18213-4 327 $a1. Current and New Practice -- 2. Cyber-Modeling, Detection, and Forensics -- 3. Proactive Defense Mechanism Design -- 4. Human System Interface -- 5. Metrics For Resilience. 330 $aThis book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios. Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Such resilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission?s survivability goals, and identify ways to design secure resilient ICS systems. This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source. 410 0$aAdvances in Information Security,$x1568-2633 ;$v75 606 $aData protection 606 $aComputer communication systems 606 $aElectrical engineering 606 $aArtificial intelligence 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 615 0$aData protection. 615 0$aComputer communication systems. 615 0$aElectrical engineering. 615 0$aArtificial intelligence. 615 14$aSecurity. 615 24$aComputer Communication Networks. 615 24$aCommunications Engineering, Networks. 615 24$aArtificial Intelligence. 676 $a658.478 702 $aRieger$b Craig$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRay$b Indrajit$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZhu$b Quanyan$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHaney$b Michael A$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910349285603321 996 $aIndustrial Control Systems Security and Resiliency$92533139 997 $aUNINA