三级一区在线视频先锋_丁香另类激情小说_中文字幕一区二区三_一本一道久久a久久精品综合蜜臀_一区二区三区四区国产精品_日韩**一区毛片_在线观看日韩电影_1000部国产精品成人观看_免费不卡在线视频_亚洲国产日日夜夜_国产亚洲精品福利_亚洲精品一区二区三区在线观看_欧美美女一区二区三区_日韩欧美色电影_欧美aaa在线_久久这里只有精品6

讀書月攻略拿走直接抄!
歡迎光臨中圖網(wǎng) 請 | 注冊

包郵 工業(yè)網(wǎng)絡(luò)安全

出版社:東南大學(xué)出版社出版時間:2018-10-01
開本: 24cm 頁數(shù): 440頁
中 圖 價:¥74.3(7.5折) 定價  ¥99.0 登錄后可看到會員價
加入購物車 收藏
開年大促, 全場包郵
?新疆、西藏除外
本類五星書更多>

工業(yè)網(wǎng)絡(luò)安全 版權(quán)信息

工業(yè)網(wǎng)絡(luò)安全 內(nèi)容簡介

  《工業(yè)網(wǎng)絡(luò)安全(影印版)》首先介紹了工業(yè)控制系統(tǒng)(ICS)技術(shù),包括芯片的體系結(jié)構(gòu)、通信媒介和協(xié)議。在介紹了ICS相關(guān)的攻擊場景之后,討論了ICS的安全性,包括網(wǎng)絡(luò)分割、縱深防御策略和保護解決方案等主題。除了保護工業(yè)控制系統(tǒng)的實際例子外,本書還詳細(xì)介紹了安全評估、風(fēng)險管理和安全程序開發(fā)。它還涵蓋了網(wǎng)絡(luò)安全方面的內(nèi)容,如威脅檢測和訪問管理,討論了與端點硬化相關(guān)的主題,如監(jiān)視、更新和反惡意軟件實現(xiàn)。

工業(yè)網(wǎng)絡(luò)安全 目錄

Preface Chapter 1: Industrial Control Systems An overview of an Industrial control system The view function The monitor function The control function The Industrial control system architecture Programmable logic controllers Human Machine Interface Supervisory Control and Data Acquisition Distributed control system Safety instrumented system The Purdue model for Industrial control systems The enterprise zone Level 5 - Enterprise network Level 4 - Site business planning and logistics Industrial Demilitarized Zone The manufacturing zone Level 3 - Site operations Level 2 - Area supervisory control Level 1 - Basic control Level 0 - Process Industrial control system communication media and protocols Regular information technology network protocols Process automation protocols Industrial control system protocols Building automation protocols Automatic meter reading protocols Communication protocols in the enterprise zone Communication protocols in the Industrial zone Summary Chapter 2: Insecure by Inheritance Industrial control system history Modbus and Modbus TCP/IP Breaking Modbus Using Python and Scapy to communicate over Modbus Replaying captured Modbus packets PROFINET PROFINET packet replay attacks $7 communication and the stop CPU vulnerability EtherNet/IP and the Common Industrial Protocol Shodan: The scariest search engine on the internet Common IT protocols found in the ICS HTTP File Transfer Protocol Telnet Address Resolution Protocol ICMP echo request Summary Chapter 3: Anatomy of an ICS Attack Scenario Setting the stage The Slumbertown paper mill Trouble in paradise Building a virtual test network Clicking our heels What can the attacker do with their access The cyber kill chain Phase two of the Slumbertown Mill ICS attack Other attack scenarios Summary Chapter 4: Industrial Control System Risk Assessment Attacks, objectives, and consequences Risk assessments A risk assessment example Step 1 - Asset identification and system characterization Step 2 - Vulnerability identification and threat modeling Discovering vulnerabilities Threat modeling Step 3 - Risk calculation and mitigation Summary Chapter 5: The Purdue Model and a Converged Plantwide Ethernet The Purdue Enterprise Reference Architecture The Converged Plantwide Enterprise The safety zone Cell/area zones Level 0 - The process Level 1 - Basic control Level 2 - Area supervisory control The manufacturing zone Level 3 - Site manufacturing operations and control The enterprise zone Level 4 - Site business planning and logistics Level 5 - Enterprise Level 3.5 - The Industrial Demilitarized Zone The CPwE industrial network security framework Summary Chapter 6: The Defense-in-depth Model ICS security restrictions How to go about defending an ICS The ICS is extremely defendable The defense-in-depth model Physical security Network security Computer security Application security Device security Policies, procedures, and awareness Summary Chapter 7: Physical ICS Security The ICS security bubble analogy Segregation exercise Down to it - Physical security Summary Chapter 8: ICS Network Security Designing network architectures for security Network segmentation The Enterprise Zone The Industrial Zone Cell Area Zones Level 3 site operations The Industrial Demilitarized Zone Communication conduits Resiliency and redundancy Architectural overview Firewalls Configuring the active-standby pair of firewalls Security monitoring and logging Network packet capturing Event logging Security information and event management Firewall logs Configuring the Cisco ASA firewall to send log data to the OSSIM server Setting the syslog logging level for Cisco devices Network intrusion detection logs Why not intrusion prevention Configuring the Cisco Sourcefire IDS to send log data to the OSSIM server Router and switch logs Configuring Cisco lOS to log to the syslog service of the OSSIM server Operating system logs Collecting logs from a Windows system Installing and configuring NXLog CE across your Windows hosts Application logs Reading an application log file with an HIDS agent on Windows Network visibility Summary Chapter 9: ICS Computer Security Endpoint hardening Narrowing the attack surface Limiting the impact of a compromise Microsoft Enhanced Mitigation Experience Toolkit Configuring EMET for a Rockwell Automation application server Microsoft AppLocker Microsoft AppLocker configuration Configuration and change management Patch management Configuring Microsoft Windows Server Update Services for the industrial zone Configuring the Cisco ASA firewall Creating the Windows Server Update Services server Configuring Windows client computers to get updates from the WSUS server Endpoint protection software Host-based firewalls Anti-malware software Types of malware Application whitelisting software Application whitelisting versus blacklisting How application whitelisting works Symantec's Embedded Security: Critical system protection Building the Symantec's Embedded Security: Critical System Protection management server Monitoring and logging Summary Chapter 10: ICS Application Security Application security Input validation vulnerabilities Software tampering Authentication vulnerabilities Authorization vulnerabilities Insecure configuration vulnerabilities Session management vulnerabilities Parameter manipulation vulnerabilities Application security testing OpenVAS security scan ICS application patching ICS secure SDLC The definition of secure SDLC Summary Chapter 11: ICS Device Security ICS device hardening ICS device patching The ICS device life cycle ICS device security considerations during the procurement phase ICS device security considerations during the installation phase ICS device security considerations during the operation phase ICS device security considerations for decommissioning and disposal Summary Chapter 12: The ICS Cybersecurity Program Development Process The NIST Guide to Industrial control systems security Obtaining senior management buy-in Building and training a cross-functional team Defining charter and scope Defining ICS-specific security policies and procedures Implementing an ICS security risk-management framework Categorizing ICS systems and network assets Selecting ICS security controls Performing (initial) risk assessment Implementing the security controls The ICS security program development process Security policies, standards, guidelines, and procedures Defining ICS-specific security policies, standards, and procedures Defining and inventorying the ICS assets Performing an initial risk assessment on discovered ICS assets The Slumbertown Paper Mill initial risk assessment Defining and prioritizing mitigation activities Defining and kicking off the security improvement cycle Summary Index
展開全部

工業(yè)網(wǎng)絡(luò)安全 作者簡介

帕斯卡·阿克曼(Pascal Ackerman) is a seasoned industrial security professional with a degree in electrical engineering and over 15 years of experience in designing, troubleshooting, and securing large-scale industrial control systems and the various types of network technologies they utilize. After more than a decade of hands-on, in-the-field experience, he joined Rockwell Automation in 2015 and is currently employed as Senior Consultant of Industrial Cybersecurity with the Network and Security Services Group. He recently became a digital nomad and now travels the world with his family while fighting cyber adversaries.

商品評論(0條)
暫無評論……
書友推薦
本類暢銷
編輯推薦
返回頂部
中圖網(wǎng)
在線客服
三级一区在线视频先锋_丁香另类激情小说_中文字幕一区二区三_一本一道久久a久久精品综合蜜臀_一区二区三区四区国产精品_日韩**一区毛片_在线观看日韩电影_1000部国产精品成人观看_免费不卡在线视频_亚洲国产日日夜夜_国产亚洲精品福利_亚洲精品一区二区三区在线观看_欧美美女一区二区三区_日韩欧美色电影_欧美aaa在线_久久这里只有精品6
www.久久爱.cn| 欧美精品一区二区蜜臀亚洲| 成人app软件下载大全免费| 国产综合久久久久久鬼色| 日韩中文字幕区一区有砖一区 | 色噜噜一区二区| 日韩影视精品| 天天综合狠狠精品| 日韩欧美一区二区三区四区| 色之综合天天综合色天天棕色| 日本日本精品二区免费| 亚洲国产一区二区精品视频| 色激情天天射综合网| 欧美美女激情18p| 欧美精品一区二区三区高清aⅴ | 久久久久久国产精品免费免费| 欧美日韩大片一区二区三区| 亚洲欧美日韩综合一区| 欧美色图激情小说| 欧美成人aa大片| 中文字幕av在线一区二区三区| 国产精品久久午夜夜伦鲁鲁| 一区二区三区中文在线| 蜜桃视频第一区免费观看| 国产福利一区在线| 国产精品国产亚洲精品看不卡15| 日韩精品国内| 91麻豆精品国产91久久久久| 国产欧美日韩另类视频免费观看| 亚洲自拍偷拍网站| 国产乱国产乱300精品| 国产精品一区二区三区不卡 | 欧美精品一区二区久久久| 最新热久久免费视频| 日本欧美大码aⅴ在线播放| 国产成人精品影院| 欧美美乳视频网站在线观看| 欧洲激情一区二区| 亚洲国产精品激情在线观看| 三级在线观看一区二区| 91在线视频播放地址| 亚洲午夜精品久久| 2021国产精品久久精品| 亚洲国产精品一区二区久久 | 国产亚洲精品免费| 五月天激情小说综合| 成人性生交大片免费看在线播放 | 亚洲乱码一区二区三区| 欧美一区二区福利视频| 亚洲黄色尤物视频| 成人免费视频播放| 亚洲mv在线看| 精品精品欲导航| 首页亚洲欧美制服丝腿| 99国产视频| 欧美性视频一区二区三区| 中文字幕色av一区二区三区| 国产一区91精品张津瑜| 日本精品国语自产拍在线观看| 日韩午夜av电影| 日韩成人精品在线观看| 国产精品一区二区不卡视频| 91精品国模一区二区三区| 亚洲图片欧美一区| 国产精品区免费视频| 欧美精品在线观看一区二区| 一区二区三区欧美激情| 91丨porny丨户外露出| 色婷婷av一区二区三区之一色屋| 欧美激情综合五月色丁香小说| 寂寞少妇一区二区三区| 亚洲精品成人自拍| 国产精品盗摄一区二区三区| 国产mv日韩mv欧美| 一本色道久久综合亚洲精品按摩| 中文字幕在线一区| 91免费国产视频网站| 欧美日韩国产在线播放网站| 亚洲线精品一区二区三区八戒| 99r国产精品视频| 日韩欧美视频一区| 国产自产v一区二区三区c| 伊人久久av导航| 一区二区三区欧美久久| 九色91在线视频| 日本一二三四高清不卡| 成人午夜视频网站| 91精品国模一区二区三区| 天堂成人免费av电影一区| 日本一区二区三不卡| 国产精品成人一区二区三区夜夜夜| 成人美女视频在线看| 91精品国产丝袜白色高跟鞋| 激情欧美日韩一区二区| 欧洲av在线精品| 日韩1区2区3区| 亚洲.欧美.日本.国产综合在线 | 久久久蜜桃精品| 粉嫩蜜臀av国产精品网站| 欧美精品aⅴ在线视频| 久久99国产精品久久| 欧美性猛片aaaaaaa做受| 日韩中文字幕区一区有砖一区| 亚洲国产精品一区在线观看不卡| 一区二区三区不卡视频在线观看| 激情小说网站亚洲综合网| 国产精品久久久久影院| 久久国产精品 国产精品| 亚洲天堂2014| 水蜜桃亚洲精品| 日韩一区精品视频| 91福利在线播放| 国内精品不卡在线| 欧美一级精品在线| 从欧美一区二区三区| 久久综合999| 国产久一道中文一区| 亚洲欧美区自拍先锋| 四虎影院一区二区三区| 日韩精品一区第一页| 在线免费亚洲电影| 国产69精品一区二区亚洲孕妇| 精品免费一区二区三区| 99中文字幕| 亚洲精品国产精华液| 亚洲一区二区三区色| 极品少妇xxxx精品少妇偷拍| 日韩亚洲欧美在线观看| 91捆绑美女网站| 亚洲精品成人精品456| 色综合色综合色综合| 国产成人综合自拍| 久久久久久久精| 欧美一区国产一区| 久久91精品久久久久久秒播| ww亚洲ww在线观看国产| 久久精品中文字幕一区二区三区| 五月激情六月综合| 日韩视频在线永久播放| 国内成+人亚洲| 日本91福利区| 精品国产乱子伦一区| 欧美大香线蕉线伊人久久国产精品 | 亚洲精品视频免费看| 一本久久a久久精品亚洲| 国产宾馆实践打屁股91| 国产精品美女久久福利网站| 中文字幕一区综合| 成人免费毛片片v| 亚洲精品久久久蜜桃| 欧美日韩国产精品自在自线| 国产超碰91| 日韩精品每日更新| 久久精品一区二区| 中文字幕日韩精品一区二区| 成人av午夜电影| 亚洲va国产va欧美va观看| 日韩欧美亚洲一区二区| 日本在线观看不卡| 丰满亚洲少妇av| 亚洲午夜一区二区| 欧美精品一区二区三区蜜桃| 亚洲一区尤物| 99re视频精品| 三级欧美韩日大片在线看| 国产亚洲精品久| 在线影院国内精品| 精品婷婷色一区二区三区蜜桃| 激情小说欧美图片| 亚洲毛片av在线| 久久婷婷色综合| 一本一本大道香蕉久在线精品 | 亚洲国产你懂的| 久久综合九色综合欧美98| 一本色道久久综合亚洲aⅴ蜜桃| 99视频国产精品免费观看| 欧美aa在线视频| 亚洲男帅同性gay1069| 精品黑人一区二区三区久久| 宅男噜噜99国产精品观看免费| 成人片在线免费看| 国产精品一区免费在线观看| 亚洲午夜久久久久久久久电影网| 精品99999| 欧美丰满一区二区免费视频| 亚洲一卡二卡| 久久久久久草| 91精品天堂| 国产传媒日韩欧美成人| 日韩不卡一区二区三区| 亚洲免费在线视频一区 二区| www激情久久| 欧美一区二区三区喷汁尤物| 日本高清成人免费播放| 色就是色欧美| 欧美三级华人主播| 久久久久久高清| 精品人伦一区二区三区| 懂色av一区二区三区在线播放| 国产成人欧美日韩在线电影|