Cyber Security Operational Technology Environments

· Mark Hayward
Libro electrónico
91
Páginas
Apto
Las calificaciones y opiniones no están verificadas. Más información

Acerca de este libro electrónico

A Critical, Must-Read for Industrial Cybersecurity Professionals

Mark Hayward's Cyber Security Operational Technology Environments is the definitive resource for anyone operating within or securing the world of industrial control systems. This book is vital because it addresses the single most critical gap in modern security: the chasm between traditional Information Technology (IT) defense and Operational Technology (OT) defense.

Hayward provides exceptional clarity by defining the unique characteristics of OT. Unlike IT, which prioritizes data, OT is designed to control physical processes in manufacturing, energy, transportation, and utilities. This fundamental difference means that an OT security failure risks safety, physical damage, and mass downtime, not just data theft.

What You Will Learn:


The Foundational Difference: Why standard IT security policies fail when applied to systems designed for "maximum safety and efficiency" over confidentiality.

Core OT Components: Gain a clear understanding of the security challenges posed by Programmable Logic Controllers (PLCs), Supervisory Control and Data Acquisition (SCADA) systems, and Distributed Control Systems (DCS).

Strategic Imperative: Position yourself as the expert who can secure the hardware and software that monitors and controls real-world assets.

This book is essential reading for CISOs, Security Architects, and OT Engineers who are responsible for maintaining the safety and efficiency of critical infrastructure. If you need to secure the systems that keep the lights on and the factories running, start here.

Acerca del autor

With over 20 years of experience in the field of cyber security, the author combines deep expertise with a passion for safeguarding digital landscapes. A seasoned professional, they have dedicated their career to developing and implementing robust security controls that protect organizations against evolving threats. Known for their insightful perspectives and hands-on approach, they are committed to empowering others through knowledge and best practices in the ever-changing realm of cyber security.

Califica este libro electrónico

Cuéntanos lo que piensas.

Información de lectura

Smartphones y tablets
Instala la app de Google Play Libros para Android y iPad/iPhone. Como se sincroniza de manera automática con tu cuenta, te permite leer en línea o sin conexión en cualquier lugar.
Laptops y computadoras
Para escuchar audiolibros adquiridos en Google Play, usa el navegador web de tu computadora.
Lectores electrónicos y otros dispositivos
Para leer en dispositivos de tinta electrónica, como los lectores de libros electrónicos Kobo, deberás descargar un archivo y transferirlo a tu dispositivo. Sigue las instrucciones detalladas que aparecen en el Centro de ayuda para transferir los archivos a lectores de libros electrónicos compatibles.