Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions
暫譯: 破解工業控制系統:ICS 與 SCADA 安全秘訣與解決方案

Clint Bodungen, Bryan Singer, Aaron Shbeeb, Kyle Wilhoit, Stephen Hilt

買這商品的人也買了...

相關主題

商品描述

Secure your ICS and SCADA systems the battle-tested Hacking Exposed™ way

This hands-on guide exposes the devious methods cyber threat actors use to compromise the hardware and software central to petroleum pipelines, electrical grids, and nuclear refineries. Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions shows, step-by-step, how to implement and maintain an ICS-focused risk mitigation framework that is targeted, efficient, and cost-effective. The book arms you with the skills necessary to defend against attacks that are debilitating―and potentially deadly. See how to assess risk, perform ICS-specific threat modeling, carry out penetration tests using “ICS safe” methods, and block malware. Throughout, the authors use case studies of notorious attacks to illustrate vulnerabilities alongside actionable, ready-to-deploy countermeasures.

Learn how to:
• Assess your exposure and develop an effective risk management plan
• Adopt the latest ICS-focused threat intelligence techniques
• Use threat modeling to create realistic risk scenarios
• Implement a customized, low-impact ICS penetration-testing strategy
• See how attackers exploit industrial protocols
• Analyze and fortify ICS and SCADA devices and applications
• Discover and eliminate undisclosed “zero-day” vulnerabilities
• Detect, block, and analyze malware of all varieties

商品描述(中文翻譯)

以經過實戰考驗的 Hacking Exposed™ 方式保護您的 ICS 和 SCADA 系統

這本實用指南揭示了網路威脅行為者用來攻擊石油管道、電力網和核煉油廠的硬體和軟體的狡詐方法。《Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets and Solutions》逐步展示了如何實施和維護一個以 ICS 為中心的風險緩解框架,該框架具有針對性、高效且具成本效益。本書使您具備必要的技能,以防禦那些可能造成重大損害甚至致命的攻擊。了解如何評估風險、執行 ICS 特定的威脅建模、使用「ICS 安全」方法進行滲透測試,以及阻擋惡意軟體。在整個過程中,作者使用著名攻擊的案例研究來說明漏洞,並提供可行的、隨時可部署的對策。

學習如何:
• 評估您的暴露程度並制定有效的風險管理計劃
• 採用最新的以 ICS 為中心的威脅情報技術
• 使用威脅建模來創建現實的風險情境
• 實施定制的低影響 ICS 滲透測試策略
• 了解攻擊者如何利用工業協議
• 分析並加固 ICS 和 SCADA 設備及應用程式
• 發現並消除未公開的「零日」漏洞
• 偵測、阻擋並分析各類惡意軟體