ICS Cyber Security Book Table of Contents

Enclosed is the table of contents for the book.

Table of Contents

Feb. 16, 2010

Enclosed is the table of contents for the book.

Table of Contents

Preface
Chapter 1 Ā Background
Chapter 2 Ā Definitions
Chapter 3 Ā ICS descriptions
Chapter 4 Ā Convergence between ICS and IT
Chapter 5 Ā Differences between ICS and IT
Chapter 6Ā Electronic threats to ICSs
Chapter 7 Ā Myths
Chapter 8Ā Current personnel status and needs
Chapter 9 Ā Information sharing and disclosures
Chapter 10 Ā Risk assessment for ICS
Chapter 11 Ā Selected industry activities
Chapter 12 Ā ICS security trends and observations
Chapter 13Ā ICS cyber security demonstrations
Chapter 14Ā Selected case histories – Malicious attacks
Chapter 15Ā Selected case histories – Unintentional incidents
Chapter 16Ā ICS incident categorization
Chapter 17 Ā Recommendations
Appendix 1 Ā Acronyms
Appendix 2 Ā Definitions
Appendix 3 Ā Comparison of key definitions
Appendix 4 Ā CSIS White Paper
Appendix 5 Ā Selected References


Joe Weiss

About the Author

jweiss

jweiss

Sign up for our eNewsletters
Get the latest news and updates