語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
An Analysis of Security in the Indus...
~
Sinclair, Andrew.
FindBook
Google Book
Amazon
博客來
An Analysis of Security in the Industrial Control Space.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
An Analysis of Security in the Industrial Control Space./
作者:
Sinclair, Andrew.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2017,
面頁冊數:
43 p.
附註:
Source: Masters Abstracts International, Volume: 57-02.
Contained By:
Masters Abstracts International57-02(E).
標題:
Information technology. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10690939
ISBN:
9780355450668
An Analysis of Security in the Industrial Control Space.
Sinclair, Andrew.
An Analysis of Security in the Industrial Control Space.
- Ann Arbor : ProQuest Dissertations & Theses, 2017 - 43 p.
Source: Masters Abstracts International, Volume: 57-02.
Thesis (M.S.)--Utica College, 2017.
The use of industrial control systems (ICS) for automation and monitoring of industrial machinery is growing. The benefits of these systems include increased reliability and control as well as greater consistency in the quality of both the service reliability and output. One of the major the caveats is that in order to realize the benefits of centralized monitoring and integration, these systems must be networked and connected to other networks, including the Internet. Like all other computing devices, networking (or the elimination of physical isolation) exposes industrial systems to network-borne vulnerabilities. In the past 10 years, critical infrastructure industrial control systems from upstate New York to the country of Georgia have fallen victim to malicious attacks that exploit the vulnerabilities of the current generation of industrial control systems and have disrupted critical services with wide-ranging effects. The individuals performing these attacks range from insider threats to nation state sponsored cyber warfare. Specific controls and countermeasures must be developed to address the holes in current industrial control standards and technologies to ensure that the ICS is out of reach to those with malicious intent. Operations and information technology teams must work together with the common purpose of protecting these systems and preventing their exploitation or infiltration.
ISBN: 9780355450668Subjects--Topical Terms:
532993
Information technology.
An Analysis of Security in the Industrial Control Space.
LDR
:02301nmm a2200301 4500
001
2203360
005
20190531104655.5
008
201008s2017 ||||||||||||||||| ||eng d
020
$a
9780355450668
035
$a
(MiAaPQ)AAI10690939
035
$a
(MiAaPQ)utica:11087
035
$a
AAI10690939
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Sinclair, Andrew.
$3
3430150
245
1 3
$a
An Analysis of Security in the Industrial Control Space.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2017
300
$a
43 p.
500
$a
Source: Masters Abstracts International, Volume: 57-02.
500
$a
Adviser: Donnie Wendt.
502
$a
Thesis (M.S.)--Utica College, 2017.
520
$a
The use of industrial control systems (ICS) for automation and monitoring of industrial machinery is growing. The benefits of these systems include increased reliability and control as well as greater consistency in the quality of both the service reliability and output. One of the major the caveats is that in order to realize the benefits of centralized monitoring and integration, these systems must be networked and connected to other networks, including the Internet. Like all other computing devices, networking (or the elimination of physical isolation) exposes industrial systems to network-borne vulnerabilities. In the past 10 years, critical infrastructure industrial control systems from upstate New York to the country of Georgia have fallen victim to malicious attacks that exploit the vulnerabilities of the current generation of industrial control systems and have disrupted critical services with wide-ranging effects. The individuals performing these attacks range from insider threats to nation state sponsored cyber warfare. Specific controls and countermeasures must be developed to address the holes in current industrial control standards and technologies to ensure that the ICS is out of reach to those with malicious intent. Operations and information technology teams must work together with the common purpose of protecting these systems and preventing their exploitation or infiltration.
590
$a
School code: 1754.
650
4
$a
Information technology.
$3
532993
650
4
$a
Computer science.
$3
523869
690
$a
0489
690
$a
0984
710
2
$a
Utica College.
$b
Cybersecurity.
$3
2098218
773
0
$t
Masters Abstracts International
$g
57-02(E).
790
$a
1754
791
$a
M.S.
792
$a
2017
793
$a
English
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=10690939
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9379909
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入