Handbook of SCADA/Control Systems Security

Free Standard Shipping

Purchasing Options

ISBN 9781466502260
Cat# K14428



SAVE 20%

eBook (VitalSource)
ISBN 9781466502277
Cat# KE15884



SAVE 30%

eBook Rentals

Other eBook Options:


  • Presents a compendium of concepts, methodologies, and other relevant material for securing industrial automation/process control systems
  • Includes protocols to be used interchangeably as a part of critical infrastructure protection program anywhere SCADA/control systems are deployed and used
  • Supplies a "best practices" approach and includes methods for securing business managers' environments at strategic, tactical, and operational levels
  • Follows a structure that parallels the way an ICS environment evolves


The availability and security of many services we rely upon—including water treatment, electricity, healthcare, transportation, and financial transactions—are routinely put at risk by cyber threats. The Handbook of SCADA/Control Systems Security is a fundamental outline of security concepts, methodologies, and relevant information pertaining to the supervisory control and data acquisition (SCADA) systems and technology that quietly operate in the background of critical utility and industrial facilities worldwide.

Divided into five sections, the book examines topics comprising functions within and throughout industrial control systems (ICS) environments. Topics include:

  • Emerging trends and threat factors that plague the ICS security community
  • Risk methodologies and principles that can be applied to safeguard and secure an automated operation
  • Methods for determining events leading to a cyber incident, and methods for restoring and mitigating issues—including the importance of critical communications
  • The necessity and reasoning behind implementing a governance or compliance program
  • A strategic roadmap for the development of a secured SCADA/control systems environment, with examples
  • Relevant issues concerning the maintenance, patching, and physical localities of ICS equipment
  • How to conduct training exercises for SCADA/control systems

The final chapters outline the data relied upon for accurate processing, discusses emerging issues with data overload, and provides insight into the possible future direction of ISC security.

The book supplies crucial information for securing industrial automation/process control systems as part of a critical infrastructure protection program. The content has global applications for securing essential governmental and economic systems that have evolved into present-day security nightmares. The authors present a "best practices" approach to securing business management environments at the strategic, tactical, and operational levels.

Table of Contents

Social Implications and Impacts
Introduction; Robert Radvanovsky
Sociological and Cultural Aspects; Jacob Brodsky
Threat Vectors; Jim Butterworth
Risk Management; Wayne Boone
Governance and Management
Disaster Recovery and Business Continuity of SCADA; Steven Young
Incident Response and SCADA; Steven Young
Forensics Management; Craig Wright
Governance and Compliance; Wayne Boone
Architecture and Modeling
Communications and Engineering Systems; Jacob Brodsky
Metrics Framework for a SCADA System; Robert Radvanovsky
Network Topology and Implementation; Jacob Brodsky
Commissioning and Operations
Obsolescence and Procurement of SCADA; Bernie Pella
Patching and Change Management; Bernie Pella
Physical Security Management; Allan McDougall and Jeff Woodruff
Tabletop/Red-Blue Exercises; Robert Radvanovsky
Integrity Monitoring; Craig Wright
Data Management and Records Retention; Jacob Brodsky
Conclusion and References
The Future of SCADA and Control Systems Security; Robert Radvanovsky
Appendix A—Listing of Online Resources SCADA/Control Systems
Appendix B—Terms and Definitions

Author Bio(s)

Editorial Reviews

"I wish that each SCADA developer read this book while developing the software, as the focus on functionality is remarkable in this collection. It explains in an easy way what happens when ‘there are some security and reliability issues around’ and what should be remembered so that it does not appear again. Every aspect is well described with clear examples."
—IEEE Communications Magazine