Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Cyber-security of SCADA and other industrial control systems
Colbert E., Kott A., Springer International Publishing, New York, NY, 2016. 355 pp. Type: Book (978-3-319321-23-3)
Date Reviewed: Apr 17 2017

Industrial control systems (ICSs) are systems comprising computers and devices that may be electrical and/or mechanical in nature. They are widely used to partially or totally control equipment in chemical plants, electric/power/nuclear utilities, water distribution/treatment plants, oil and gas distribution networks, manufacturing, industries, and so on. Supervisory control and data acquisition (SCADA) systems are a subclass of ICSs in which supervision is exercised over multiple, distributed lower-level control systems. The security vulnerabilities in ICSs have been a matter of great concern because public safety could be significantly affected if hackers exploit them. This book on the cyber-security of SCADA and other ICSs has been published in the Springer series “Advances in Information Security.” It has 16 chapters contributed by academics and researchers.

The introductory chapter contains a preview of the book. The rest of the chapters look at a variety of topics. These include components of an ICS that may be connected by wires, which, though very useful, may get damaged by natural or man-made disasters. So it is necessary to look at wireless infrastructure in ICSs. Modern ICSs are often complex; hence, it is essential to consider IT and operational technology in those systems. It is important to understand security threats to ICSs and also the attacks made possible by those threats. Security taxonomies help in understanding the threats and attacks in a beneficial manner. Cyber risk assessment and management is also crucial in the context of ICSs because we must quantify the risks and try to mitigate them.

The chapter on security metrics concentrates on metrics of resilience. Pointers are given for formulating metrics that will be effective. It is important to understand the science, technology, and practice of human perception, comprehension of events, and entities in the defense of ICSs. This is called situational awareness. It is essential to detect intrusions into ICSs. A chapter studies intrusion detection along with a case study. The next chapter focuses on the use of physical measurements for intrusion detection and also includes a case study. Experimental methods are shown to be crucial for control system security research. Despite the existence of decision-support systems and experimentation methods, it is not easy for stakeholders of ICSs to make decisions. Thus, it is necessary to study governance and assessment strategies. Nowadays, it has become requisite to study ways of responding to attacks on ICSs due to the threat of sabotage by rogue nations; a chapter is devoted exclusively to this unusual topic. The concluding chapter looks at the future: IoT (Internet of Things) and security of its control systems. In the future, IoT is going to become predominant in many industrial applications including ICSs, so this explains the need for focusing on the security of IoT.

The book, which contains a few color illustrations, includes contributions from many authors with varying backgrounds. In spite of this, the editors have produced a consistent book. The chapters include many references to the literature, but the book does not have an index. There are very few books in the market on the cyber-security of ICSs [see 1-6], so this book is a welcome addition. It includes contributions from experts; however, it is quite readable even by novices. It can be used for teaching a course on the security of ICSs.

Reviewer:  S. V. Nagaraj Review #: CR145202 (1707-0444)
1) Knapp, E. D.; Langill, J. T. Industrial network security: securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems (2nd ed.). Syngress, Waltham, MA, 2014.
2) Macaulay, T.; Singer, B. L. Cybersecurity for industrial control systems: SCADA, DCS, PLC, HMI, and SIS. CRC Press, Boca Raton, FL, 2011.
3) Radvanovsky, R.; Brodsky, J. Handbook of SCADA/control systems security (2nd ed.). CRC Press, Boca Raton, FL, 2016.
4) Cheng, P.; Zhang, H.; Chen, J. Cyber security for industrial control systems: from the viewpoint of close-loop. CRC Press , Boca Raton, FL, 2016.
5) Ginter, A. SCADA security: what's broken and how to fix it. Abterra Technologies Inc, , Calgary, AB, Canada, 2016.
6) Stouffer, K.; Pillitteri, V.; Lightman, S.; Abrams, M.; Hahn, A. Guide to industrial control systems (ICS) security. NIST, Washington, DC, 2015, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-82r2.pdf.
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (K.6.5 )
 
 
Command And Control (J.7 ... )
 
 
Security and Protection (C.2.0 ... )
 
 
General (C.2.0 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy