Robust Control System Networks : How to Achieve Reliable Control After Stuxnet

Title: Robust Control System Networks : How to Achieve Reliable Control After Stuxnet
Author: Ralph Langner
ISBN: 1606503006 / 9781606503003
Format: Hard Cover
Pages: 206
Publisher: Momentum Press
Year: 2011
Availability: Out of Stock

Tab Article

"This is the first great, 5-star ICS security book.“  Dale Peterson, Digital Bond

"Read Robust Control System Networks — it’s brief, concise, well-written, full of compelling anecdotes, and groundbreaking“  Richard Bejtlich, TaoSecurity

He was the researcher who was one of the first to identify and analyze the infamous industrial control system malware "Stuxnet," and has now written a book that takes a new, radical approach to making Industrial control systems safe from such cyber attacks: design the controls systems themselves to be "robust."

Other security experts advocate risk management, implementing more firewalls and carefully managing passwords and access. Not so this book: those measures, while necessary, can still be circumvented. Instead, this book shows in clear, concise detail how a system that has been set up with an eye toward quality design in the first place is much more likely to remain secure and less vulnerable to hacking, sabotage or malicious control.

It blends several well-established concepts and methods from control theory, systems theory, cybernetics and quality engineering to create the ideal protected system. The book's maxim is taken from the famous quality engineer William Edwards Deming, "If I had to reduce my message to management to just a few words, I'd say it all has to do with reducing variation." Highlights include: - An overview of the problem of "cyber fragility" in industrial control systems - How to make an industrial control system "robust," including principal design objectives and overall strategic planning - Why using the methods of quality engineering like the Taguchi method, SOP and UML will help to design more "armored" industrial control systems.

Tab Article

Preface
About the Author

Chapter 1 : Introduction : The Three Faces of Risk
Chapter 2 : The Problem of Cyber Fragility in Industrial Automation and Control
Chapter 3 : Cyber Robustness
Chapter 4 : Building a System Model
Chapter 5 : Requirements and System Specification
Chapter 6 : Imposing Structure
Chapter 7 : Enforcing and Reinforcing Structure
Chapter 8 : Modifying Structure

Epilogue
Appendix
A : Surprise! Nonobvious, Nonanticipated Cyber Fragility Effects
B : Conservative Engineering Habits Resulting in Cyber Fragility
C : Cyber Robustness Versus IT Security
References
List of Acronyms
Index