Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure
By Greg Miles, Jack Wiles, Ted Claypoole and
()
About this ebook
This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD.
- Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure
- Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures
- Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more
- Companion Website featuring video interviews with subject matter experts offer a "sit-down" with the leaders in the field
Greg Miles
Greg Miles,(Ph.D., CISSP#24431, CISM#0300338, IAM, IEM)is the President, and Chief Financial Officer of Security Horizon, Inc. Security Horizon is a Global, Veteran-Owned Small Business headquartered in Colorado Springs, Colorado.
Read more from Greg Miles
Network Security Evaluation Using the NSA IEM Rating: 3 out of 5 stars3/5IT Security Interviews Exposed: Secrets to Landing Your Next Information Security Job Rating: 0 out of 5 stars0 ratings
Related to Techno Security's Guide to Securing SCADA
Related ebooks
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents Rating: 0 out of 5 stars0 ratingsIndustrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems Rating: 0 out of 5 stars0 ratings8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 0 out of 5 stars0 ratingsAdvanced Persistent Threat: Understanding the Danger and How to Protect Your Organization Rating: 1 out of 5 stars1/5Designing a HIPAA-Compliant Security Operations Center: A Guide to Detecting and Responding to Healthcare Breaches and Events Rating: 0 out of 5 stars0 ratingsThor's Microsoft Security Bible: A Collection of Practical Security Techniques Rating: 0 out of 5 stars0 ratings(ISC)2 CISSP Certified Information Systems Security Professional Official Practice Tests Rating: 5 out of 5 stars5/5CISSP Study Guide Rating: 0 out of 5 stars0 ratingsCyber Security Policy Guidebook Rating: 0 out of 5 stars0 ratingsInformation Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data Rating: 5 out of 5 stars5/5Anti Hacking Security: Fight Data Breach Rating: 0 out of 5 stars0 ratingsBuilding a Practical Information Security Program Rating: 5 out of 5 stars5/5Security Technology Convergence Insights Rating: 0 out of 5 stars0 ratingsThe Best Damn Cybercrime and Digital Forensics Book Period Rating: 3 out of 5 stars3/5Threat Forecasting: Leveraging Big Data for Predictive Analysis Rating: 0 out of 5 stars0 ratingsPhysical and Logical Security Convergence: Powered By Enterprise Security Management Rating: 0 out of 5 stars0 ratingsImplementing Digital Forensic Readiness: From Reactive to Proactive Process Rating: 0 out of 5 stars0 ratingsIntroduction to US Cybersecurity Careers Rating: 3 out of 5 stars3/5IT OT Convergence A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsOperational Technology Security A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsFramework for SCADA Cybersecurity Rating: 5 out of 5 stars5/5Risk and Cybersecurity Third Edition Rating: 0 out of 5 stars0 ratingsNetwork and Information Systems (NIS) Regulations - A pocket guide for operators of essential services Rating: 0 out of 5 stars0 ratingsImplementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines Rating: 0 out of 5 stars0 ratingsIndustrial Network Security, Second Edition Rating: 3 out of 5 stars3/5Cyber Security Audit A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsIT Service Root Cause Analysis Tools The Ultimate Step-By-Step Guide Rating: 0 out of 5 stars0 ratingsOperational Technology: A Holistic View Rating: 0 out of 5 stars0 ratingsTechnology Risk And Cybersecurity A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratings
Business For You
Emotional Intelligence: Exploring the Most Powerful Intelligence Ever Discovered Rating: 5 out of 5 stars5/5The Richest Man in Babylon: The most inspiring book on wealth ever written Rating: 5 out of 5 stars5/5Your Next Five Moves: Master the Art of Business Strategy Rating: 5 out of 5 stars5/5The Book of Beautiful Questions: The Powerful Questions That Will Help You Decide, Create, Connect, and Lead Rating: 4 out of 5 stars4/5Law of Connection: Lesson 10 from The 21 Irrefutable Laws of Leadership Rating: 4 out of 5 stars4/5Becoming Bulletproof: Protect Yourself, Read People, Influence Situations, and Live Fearlessly Rating: 4 out of 5 stars4/5The Intelligent Investor, Rev. Ed: The Definitive Book on Value Investing Rating: 4 out of 5 stars4/5How to Write a Grant: Become a Grant Writing Unicorn Rating: 5 out of 5 stars5/5Tools Of Titans: The Tactics, Routines, and Habits of Billionaires, Icons, and World-Class Performers Rating: 4 out of 5 stars4/5Suddenly Frugal: How to Live Happier and Healthier for Less Rating: 3 out of 5 stars3/5Limited Liability Companies For Dummies Rating: 5 out of 5 stars5/5Confessions of an Economic Hit Man, 3rd Edition Rating: 5 out of 5 stars5/5The Five Dysfunctions of a Team: A Leadership Fable, 20th Anniversary Edition Rating: 4 out of 5 stars4/5Robert's Rules Of Order Rating: 5 out of 5 stars5/5Grant Writing For Dummies Rating: 5 out of 5 stars5/5Set for Life: An All-Out Approach to Early Financial Freedom Rating: 4 out of 5 stars4/5How to Get Ideas Rating: 5 out of 5 stars5/5Lying Rating: 4 out of 5 stars4/5Crucial Conversations Tools for Talking When Stakes Are High, Second Edition Rating: 4 out of 5 stars4/5Nickel and Dimed: On (Not) Getting By in America Rating: 4 out of 5 stars4/5The Catalyst: How to Change Anyone's Mind Rating: 4 out of 5 stars4/5Crucial Conversations: Tools for Talking When Stakes are High, Third Edition Rating: 4 out of 5 stars4/5How to Grow Your Small Business: A 6-Step Plan to Help Your Business Take Off Rating: 0 out of 5 stars0 ratingsCollaborating with the Enemy: How to Work with People You Don’t Agree with or Like or Trust Rating: 4 out of 5 stars4/5
Reviews for Techno Security's Guide to Securing SCADA
0 ratings0 reviews
Book preview
Techno Security's Guide to Securing SCADA - Greg Miles
1
Physical Security
SCADA and the Critical Infrastructure’s Biggest Vulnerability
Jack Wiles, (PPS, IAM, IEM) is a Security Professional with over 30 years experience in security related fields. This includes computer security, disaster recovery and physical security. He is a professional member of the National Speakers Association and has trained federal agents, corporate attorneys and internal auditors on a number of computer crime related topics. He is a pioneer in presenting on a number of subjects that are now being labeled ‘Homeland Security’ topics. Well over 10,000 people have attended one or more of his presentations since 1988. Jack is also a co-founder and President of TheTrainingCo., producers of the Annual Techno Security Conferences and the popular Techno Forensics conferences. He is in frequent contact with members of many state and local law enforcement agencies as well as Special Agents with the U.S. Secret Service, FBI, U.S. Customs, Department of Justice, The Department of Defense and numerous members of High-Tech Crime units. He was also appointed as the first President of the North Carolina InfraGard chapter that is now one of the largest chapters in the country. He is also a founding member and ‘official’ MC of the US Secret Service South Carolina Electronic Crimes Task Force.
Jack is also a Vietnam veteran who served with the 101st Airborne Division in Vietnam in 1967–68. He recently retired from the U.S. Army Reserves as a lieutenant colonel and was assigned directly to the Pentagon for the final seven years of his career. In his spare time, he has been a senior contributing editor for several local, national and international magazines.
Introduction
Please don’t let my opening chapter’s title make you think that I’m starting this book off in a negative light. Believe me, I’m not. There are many positive things we can all do to help secure our most critical applications and resources. Some of the things I will discuss in this chapter have been on my mind since the mid ‘70s. I believe it’s time that I put them in writing, and present my thoughts on what I believe could be the biggest potential hole in any security plan: Physical Security!
This chapter (as well as the rest of the book) isn’t meant to be read as a complete story from beginning to end. I’m writing it as a collection of experiences and learned lessons from 30-plus years of working in the fields of physical and technical security. Some of the subject matter in this chapter is partially covered in chapters of mine in our other Techno Security’s Guide series of books. I do believe that the readers of this book will most likely come from a different group of specialists than the readers of our other books. Throughout the book, you will also notice that several of our authors will address similar topics from their perspective and experience level. A good example of this will be the discussion of locks, keys, and bypass methods. I first became a locksmith in 1970 and worked in a locksmith shop for several years learning the trade. I’ll share a lot of my thoughts on this critical subject throughout my chapter. Unlike the technical world where most things sitting on your desk are already obsolete, many of the locks used in our buildings (and in our homes) haven’t changed at all in many, many years. Most of what I learned in the early ‘70s is still very applicable today when it comes to the common locks found on about 95 percent of the doors on the planet.
The reason that I rambled a little about locks at the beginning of my chapter is to let you know that some of the other authors in this book will have their own opinions and suggestions regarding these critical pieces of hardware. Marc Weber Tobias wrote one of our chapters, where he goes into great detail on High Security Locks and their possible vulnerabilities. Without question, Marc is considered one of the most gifted experts in the world today in understanding and researching the security offered by many types of locks. We are honored to have his work in this book. Be sure to read his chapter carefully, because some of the locks you’re relying on to protect critical information and equipment might not be as secure as you