LEADER 03561nam 2200469 450 001 9910830481603321 005 20230629222128.0 010 $a1-5231-4617-6 010 $a1-119-86181-0 010 $a1-119-86179-9 035 $a(MiAaPQ)EBC6947031 035 $a(Au-PeEL)EBL6947031 035 $a(CKB)21475268200041 035 $a(EXLCZ)9921475268200041 100 $a20221113d2022 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aManaging cybersecurity in the process industries $ea risk-based approach /$fCCPS (Center for Chemical Process Safety) 210 1$aHoboken, NJ :$cJohn Wiley and Sons Inc. :$cAmerican Institute of Chemical Engineers,$d[2022] 210 4$dİ2022 215 $a1 online resource (476 pages) 311 08$aPrint version: Safety), CCPS (Center for Chemical Process Managing Cybersecurity in the Process Industries Newark : American Institute of Chemical Engineers,c2022 9781119861782 320 $aIncludes bibliographical references and index. 327 $aFront Matter -- Introduction, Background, and History of Cybersecurity. Purpose of this Book -- Types of Cyber-Attacks, Who Engages in Them and Why -- Types of Risk Receptors/Targets -- Threat Sources and Types of Attacks -- Who Could Create a Cyber Risk? Insider vs. Outsider Threats -- Case Histories -- Integrating Cybersecurity Management into the Process Safety Framework. General Model for Understanding Cybersecurity Risk -- Designing a Secure Industrial Automation and Control System -- Hazard Identification and Risk Analysis (HIRA) -- Manage the Risk -- Implementing a Holistic Approach to Safety and Cybersecurity -- Where Do We Go from Here?. What's Next? A Look at Future Development Opportunities -- Available Resources -- Excerpt from NIST Cybersecurity Framework -- Detailed Cybersecurity PHA and LOPA Example -- Example Cybersecurity Metrics -- Cybersecurity Sample Audit Question List -- Management System Review Examples -- References -- Index 330 $aThe chemical process industry is a rich target for cyber attackers who are intent on causing harm. Current risk management techniques are based on the premise that events are initiated by a single failure and the succeeding sequence of events is predictable. A cyberattack on the Safety, Controls, Alarms, and Interlocks (SCAI) undermines this basic assumption. Each facility should have a Cybersecurity Policy, Implementation Plan and Threat Response Plan in place. The response plan should address how to bring the process to a safe state when controls and safety systems are compromised. The emergency response plan should be updated to reflect different actions that may be appropriate in a sabotage situation. IT professionals, even those working at chemical facilities are primarily focused on the risk to business systems. This book contains guidelines for companies on how to improve their process safety performance by applying Risk Based Process Safety (RBPS) concepts and techniques to the problem of cybersecurity. 606 $aChemical processes 606 $aChemical industry 606 $aComputer security 615 0$aChemical processes. 615 0$aChemical industry. 615 0$aComputer security. 676 $a660.068 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910830481603321 996 $aManaging cybersecurity in the process industries$94009092 997 $aUNINA