Название: How to Be OT Cybersecurity Professional Автор: Nebras Alqurashi Издательство: Austin Macauley Publishers Год: 2023-07-31 Страниц: 238 Язык: английский Формат: epub (true) Размер: 12.4 MB
It's a bitter truth that we live in an age of vulnerable systems, where our existence is completely dependent on them. Cyber attacks can cause greater damage than actual war losses for a country that is unprepared for them. After several incidents that impacted social order, governments have realized this fact.
During a cyber attack, the city will be paralyzed, food supply will be interrupted, and medical care will be disrupted. There would be human casualties and the worst of the people would emerge if fuel or electricity were unavailable.
The age of cyber missiles has arrived, and as Dale Peterson pointed out, our infrastructure systems are insecure by design. We need to learn how to secure all operational technology, it's crucial, and it can only be done by understanding the bits and bytes of these operations. In this book, you'll learn Cybersecurity for Operational Technology, how to secure all types of Operational Technology, and how to save lives!
This book is not a reference for protocols, specific industries, or standards. It will take you through the concept, drill down into the essential details, and extend the discussion when required on particular topics. When OT Protocol is discussed, it will show captures taken from Wireshark of how the packets are formed, and it’s essential to get used to that. In the end, in OT Cybersecurity, you are more concerned about understanding the operation and associated risks based on the traffic going through the network, and it’s essential to have a sound understanding of the most common OT protocols. Some protocols cover too many details, and some show less, depending on the need and my observation from actual use cases. However, it only trains you to read and understand a protocol, so following the book will prepare you to have good experience in analyzing other OT protocols that are not mentioned in the book if you need to learn more about them.
Who Is This Book For? For IT Cybersecurity professionals who would like to learn about OT Cybersecurity, this book is the best fit for engineers and managers alike. Although some managers might not be interested in the details of protocols, they can skip the parts that dive into details of the protocols that are always at the end of the chapters. Those who are coming from OT/ICS/SCADA background and would like to learn about OT Cybersecurity can skip part one and begin from part 2; however, always a knowledge refresh is good to have. But it’s mandatory to have a basic understanding of TCP/IP networks. If that’s not the case, I recommend starting from there before reading this book.
The same goes for students or those who are starting their careers, the book would be helpful, but you need to have a basic understanding of TCP/IP communications first. Almost every chapter is independent, except for Part 1, which is a foundation understanding for all chapters; still, since it’s in a training format, some details in one chapter won’t be repeated in the next ones. That being said, if you are reading the book only for a specific subject(s), you might be missing some part that was covered in the previous chapter(s), and it makes no sense to repeat it in the same book, so you may need to at least read all chapters within the same part your subject is listed within.
Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.