ICS Cyber Security Book Table of Contents

Feb. 16, 2010

Enclosed is the table of contents for the book.

Table of Contents

Enclosed is the table of contents for the book.

Table of Contents

Chapter 1  Background
Chapter 2  Definitions
Chapter 3  ICS descriptions
Chapter 4  Convergence between ICS and IT
Chapter 5  Differences between ICS and IT
Chapter 6 Electronic threats to ICSs
Chapter 7  Myths
Chapter 8 Current personnel status and needs
Chapter 9  Information sharing and disclosures
Chapter 10  Risk assessment for ICS
Chapter 11  Selected industry activities
Chapter 12  ICS security trends and observations
Chapter 13 ICS cyber security demonstrations
Chapter 14 Selected case histories – Malicious attacks
Chapter 15 Selected case histories – Unintentional incidents
Chapter 16 ICS incident categorization
Chapter 17  Recommendations
Appendix 1  Acronyms
Appendix 2  Definitions
Appendix 3  Comparison of key definitions
Appendix 4  CSIS White Paper
Appendix 5  Selected References

Joe Weiss

Sponsored Recommendations

Measurement instrumentation for improving hydrogen storage and transport

Hydrogen provides a decarbonization opportunity. Learn more about maximizing the potential of hydrogen.

Get Hands-On Training in Emerson's Interactive Plant Environment

Enhance the training experience and increase retention by training hands-on in Emerson's Interactive Plant Environment. Build skills here so you have them where and when it matters...

Learn About: Micro Motion™ 4700 Config I/O Coriolis Transmitter

An Advanced Transmitter that Expands Connectivity

Learn about: Micro Motion G-Series Coriolis Flow and Density Meters

The Micro Motion G-Series is designed to help you access the benefits of Coriolis technology even when available space is limited.