您好,欢迎来到聚文网。 登录 免费注册
工业网络安全(影印版)

工业网络安全(影印版)

  • 字数: 558千字
  • 装帧: 平装
  • 出版社: 东南大学出版社
  • 作者: (美)帕斯卡·阿克曼(Pascal Ackerman)
  • 出版日期: 2018-10-01
  • 商品条码: 9787564178635
  • 版次: 1
  • 开本: 16开
  • 页数: 440
  • 出版年份: 2018
定价:¥99 销售价:登录后查看价格  ¥{{selectedSku?.salePrice}} 
库存: {{selectedSku?.stock}} 库存充足
{{item.title}}:
{{its.name}}
精选
内容简介
《工业网络安全(影印版)》首先介绍了工业控制系统(ICS)技术,包括芯片的体系结构、通信媒介和协议。在介绍了ICS相关的攻击场景之后,讨论了ICS的安全性,包括网络分割、纵深防御策略和保护解决方案等主题。除了保护工业控制系统的实际例子外,本书还详细介绍了安全评估、风险管理和安全程序开发。它还涵盖了网络安全方面的内容,如威胁检测和访问管理,讨论了与端点硬化相关的主题,如监视、更新和反恶意软件实现。
作者简介
 
目录
Preface
Chapter 1:Industrial Control Systems
An overview of an Industrial control system
The view function
The monitor function
The control function
The Industrial control system architecture
Programmable logic controllers
Human Machine Interface
Supervisory Control and Data Acquisition
Distributed control system
Safety instrumented system
The Purdue model for Industrial control systems
The enterprise zone
Level 5-Enterprise network
Level 4-Site business planning and logistics
Industrial Demilitarized Zone
The manufacturing zone
Level 3-Site operations
Level 2-Area supervisory control
Level 1-Basic control
Level 0-Process
Industrial control system communication media and protocols
Regular information technology network protocols
Process automation protocols
Industrial control system protocols
Building automation protocols
Automatic meter reading protocols
Communication protocols in the enterprise zone
Communication protocols in the Industrial zone
Summary
Chapter 2:Insecure by Inheritance
Industrial control system history
Modbus and Modbus TCP/IP
Breaking Modbus
Using Python and Scapy to communicate over Modbus
Replaying captured Modbus packets
PROFINET
PROFINET packet replay attacks
S7 communication and the stop CPU vulnerability
EtherNet/IP and the Common Industrial Protocol
Shodan:The scariest search engine on the internet
Common IT protocols found in the ICS
HTTP
File Transfer Protocol
Telnet
Address Resolution Protocol
ICMP echo request
Summary
Chapter 3:Anatomy of an ICS Attack Scenario
……

蜀ICP备2024047804号

Copyright 版权所有 © jvwen.com 聚文网