Account
Orders
Advanced search
An Introduction to Securing a Complex Industrial Environment
Louise Reader
Read on Louise Reader App.
Operational Technology (OT) refers to hardware and software used to monitor, control, and manage industrial processes, infrastructure, and assets across sectors like manufacturing, energy, transportation, and utilities. It includes systems such as Industrial Control Systems (ICS), SCADA, PLCs, and DCS.
ICS Security is the protection of industrial automation and control systems that manage critical operations like power generation, water treatment, and oil and gas production. Its goal is to safeguard confidentiality, integrity, and availability while mitigating risks from cyber threats, disruptions, and unauthorized access.
With this book, our goal is to help readers understand how to secure complex industrial environments by providing a clear introduction to ICS and OT security.
We will begin by explaining what ICS and OT are, how they differ from traditional IT, and why those differences matter. From there, the discussion will focus on the increasing importance of ICS/OT security—particularly in the context of IT and OT convergence, where systems and data are becoming more interconnected.
You will also gain an understanding of the key components that make up Industrial Control Systems and how they work together to monitor and control industrial operations. These components—including SCADA, PLC, HMI, and DCS—are essential for ensuring operational efficiency, safety, and security in industries like manufacturing, energy, and critical infrastructure.
What you Will Learn
· The major differences between IT and OT security
· Key components of Industrial Control Systems
· The major challenges in ICS/OT security
· Why ICS/OT security is very important in the digitalization era
· The most common and widely used ICS/OT standards, tools, and frameworks
Who This Book is for:
Beginners of OT Security environment. The book assumes you have an understanding of the IT Security environment and will be a great book for those who wish to learn the major differences and key elements of ICS and OT Security.
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
This ebook is DRM protected.
LCP system provides a simplified access to ebooks: an activation key associated with your customer account allows you to open them immediately.
ebooks downloaded with LCP system can be read on:
Adobe DRM associates a file with a personal account (Adobe ID). Once your reading device is activated with your Adobe ID, your ebook can be opened with any compatible reading application.
ebooks downloaded with Adobe DRM can be read on:
mobile-and-tablet To check the compatibility with your devices,see help page
Massimo Nardone has more than 30 years of experience in information and cybersecurity for IT/OT/IoT/IIoT, web/mobile development, cloud, and IT architecture. His true IT passions are security and Android. He holds an M.Sc. degree in computing science from the University of Salerno, Italy.
Throughout his working career, he has held various positions starting as programming developer, then security teacher, PCI QSA, Auditor, Assessor, Lead IT/OT/SCADA/SCADA/Cloud Architect, CISO, BISO, Executive, Program Director, OT/IoT/IIoT Security Competence Leader, etc.In his last working engagement, he worked as a seasoned Cyber and Information Security Executive, CISO and OT, IoT and IIoT Security competence Leader helping many clients to develop and implement Cyber, Information, OT, IoT Security activities.
He is currently working as Vice President of OT Security for SSH Communications Security.
He is an Apress co-author of numerous books, including Spring Security 6 Recipes, Secure RESTful APIs, Cybersecurity Threats and Attacks in the Gaming Industry, Pro Spring Security, Beginning EJB in Java EE 8, Pro JPA 2 in Java EE 8 , Pro Android Games, and has reviewed more than 100 titles.
Sign up to get our latest ebook recommendations and special offers