×







We sell 100% Genuine & New Books only!

Security Assessment of SCADA Protocols - A Taxonomy Based Methodology at Meripustak

Security Assessment of SCADA Protocols - A Taxonomy Based Methodology by Vinay M Igure , VDM Verlag

Books from same Author: Vinay M Igure

Books from same Publisher: VDM Verlag

Related Category: Author List / Publisher List


  • Price: ₹ 12570.00/- [ 7.00% off ]

    Seller Price: ₹ 11690.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)Vinay M Igure
    PublisherVDM Verlag
    ISBN9783836459907
    Pages112
    BindingPaperback
    LanguageEnglish
    Publish YearMarch 2008

    Description

    VDM Verlag Security Assessment of SCADA Protocols - A Taxonomy Based Methodology by Vinay M Igure

    Modern industrial facilities, such as oil refineries, chemical factories, electric power generation plants, etc. are large, complex, distributed systems. These systems are monitored and controlled by networks of special purpose embedded computing devices such as sensors, actuators, and PLCs. These industrial control networks are commonly called SCADA (Supervisory Control and Data Acquisition) networks. The increasing interconnectivity of SCADA networks has exposed them to a wide range of network security problems. One of the important issues in securing SCADA networks is to identify vulnerabilities in the communication protocols. This book analyses existing qualitative security assessment guidelines, specifically attack and vulnerability taxonomies, and proposes a new framework for organizing information about known attacks and vulnerabilities to find unknown or similar vulnerabilities in new systems. This framework is used to organize information related to known vulnerabilities in SCADA protocols into a taxonomy that provides a systematic methodology for the security assessment of other SCADA protocols._x000D_



    Book Successfully Added To Your Cart