Book Image

Securing Industrial Control Systems and Safety Instrumented Systems

By : Jalal Bouhdada
Book Image

Securing Industrial Control Systems and Safety Instrumented Systems

By: Jalal Bouhdada

Overview of this book

As modern process facilities become increasingly sophisticated and vulnerable to cyber threats, securing critical infrastructure is more crucial than ever. This book offers an indispensable guide to industrial cybersecurity and Safety Instrumented Systems (SIS), vital for maintaining the safety and reliability of critical systems and protecting your operations, personnel, and assets. Starting with SIS design principles, the book delves into the architecture and protocols of safety networks. It provides hands-on experience identifying vulnerabilities and potential attack vectors, exploring how attackers might target SIS components. You’ll thoroughly analyze Key SIS technologies, threat modeling, and attack techniques targeting SIS controllers and engineer workstations. The book shows you how to secure Instrument Asset Management Systems (IAMS), implement physical security measures, and apply integrated risk management methodologies. It also covers compliance with emerging cybersecurity regulations and industry standards worldwide. By the end of the book, you’ll have gained practical insights into various risk assessment methodologies and a comprehensive understanding of how to effectively protect critical infrastructure.
Table of Contents (14 chapters)
1
Part 1:Safety Instrumented Systems
5
Part 2: Attacking and Securing SISs
8
Part 3: Risk Management and Compliance

Part 1:Safety Instrumented Systems

This book begins with a comprehensive introduction to Safety Instrumented Systems (SISs), covering essential safety and cybersecurity concepts as well as terminology specific to process safety cybersecurity. The goal of the initial chapter is to establish a solid foundation of knowledge, enabling readers to delve deeper into more complex topics in subsequent chapters. Chapter 2 addresses and clarifies common misconceptions about SIS cybersecurity to ensure a clear understanding before progressing to more detailed discussions. Chapter 3 explores the security design and architecture, including protocols and best practices, emphasizing the secure-by-design principles.

This part has the following chapters:

  • Chapter 1, Introduction to Safety Instrumented Systems (SISs)
  • Chapter 2, SIS Evolution and Trends
  • Chapter 3, SIS Security Design and Architecture

This structure ensures a progressive learning experience, equipping readers with...