• Complain

CCPS (Center for Chemical Process Safety) - Managing Cybersecurity in the Process Industries: A Risk-based Approach

Here you can read online CCPS (Center for Chemical Process Safety) - Managing Cybersecurity in the Process Industries: A Risk-based Approach full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Hoboken, year: 2022, publisher: Wiley-AIChE, genre: Computer / Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover

Managing Cybersecurity in the Process Industries: A Risk-based Approach: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Managing Cybersecurity in the Process Industries: A Risk-based Approach" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

The chemical process industry is a rich target for cyber attackers who are intent on causing harm. Current risk management techniques are based on the premise that events are initiated by a single failure and the succeeding sequence of events is predictable. A cyberattack on the Safety, Controls, Alarms, and Interlocks (SCAI) undermines this basic assumption. Each facility should have a Cybersecurity Policy, Implementation Plan and Threat Response Plan in place. The response plan should address how to bring the process to a safe state when controls and safety systems are compromised. The emergency response plan should be updated to reflect different actions that may be appropriate in a sabotage situation. IT professionals, even those working at chemical facilities are primarily focused on the risk to business systems. This book contains guidelines for companies on how to improve their process safety performance by applying Risk Based Process Safety (RBPS) concepts and techniques to the problem of cybersecurity.

CCPS (Center for Chemical Process Safety): author's other books


Who wrote Managing Cybersecurity in the Process Industries: A Risk-based Approach? Find out the surname, the name of the author of the book and a list of all author's works by series.

Managing Cybersecurity in the Process Industries: A Risk-based Approach — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Managing Cybersecurity in the Process Industries: A Risk-based Approach" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Table of Contents List of Tables Chapter 1 Chapter 3 Chapter 4 Chapter - photo 1
Table of Contents
List of Tables
  1. Chapter 1
  2. Chapter 3
  3. Chapter 4
  4. Chapter 5
  5. Chapter 6
  6. Chapter 7
  7. Chapter 8
  8. Chapter 9
  9. Chapter 10
  10. Chapter 11
  11. Chapter 13
  12. Appendix A
  13. Appendix B
  14. Appendix D
List of Illustrations
  1. Chapter 1
  2. Chapter 4
  3. Chapter 6
  4. Chapter 7
  5. Chapter 8
  6. Chapter 9
  7. Chapter 10
  8. Chapter 11
  9. Chapter 12
  10. Chapter 13
  11. Appendix B
Guide
Pages

This book is one in a series of process safety guidelines and concept books published by the Center for Chemical Process Safety (CCPS). Refer to www.wiley.com/go/ccps for full list of titles in this series.

It is sincerely hoped that the information presented in this document will lead to a better safety record for the entire industry; however, neither the American Institute of Chemical Engineers, its consultants, CCPS Technical Steering Committee and Subcommittee members, their employers, their employers' officers and directors, nor exida, and its employees and subcontractors warrant or represent, expressly or by implication, the correctness or accuracy of the content of the information presented in this document. As between (1) American Institute of Chemical Engineers, its consultants, CCPS Technical Steering Committee and Subcommittee members, their employers, their employers' officers and directors, and exida and its employees and subcontractors, and (2) the user of this document, the user accepts any legal liability or responsibility whatsoever for the consequence of its use or misuse.

Managing Cybersecurity in the Process Industries
A RiskBased Approach

CENTER FOR CHEMICAL PROCESS SAFETY

of the

AMERICAN INSTITUTE OF CHEMICAL ENGINEERS

120 Wall Street, 23rd Floor New York, NY 10005

This edition first published 2022 2022 the American Institute of Chemical - photo 2
This edition first published 2022 2022 the American Institute of Chemical - photo 3

This edition first published 2022

2022 the American Institute of Chemical Engineers

A Joint Publication of the American Institute of Chemical Engineers and John Wiley & Sons, Inc.

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.

The rights of CCPS to be identified as the author of the editorial material in this work have been asserted in accordance with law.

Registered Office

John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA

Editorial Office

111 River Street, Hoboken, NJ 07030, USA

For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.

Wiley also publishes its books in a variety of electronic formats and by printondemand. Some content that appears in standard print versions of this book may not be available in other formats.

Limit of Liability/Disclaimer of Warranty

While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or service the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

Library of Congress CataloginginPublication Data is Applied for:

ISBN: 9781119861782

Cover Design: Wiley

Cover Images: Alexander Supertramp/Shutterstock, Travel mania/Shutterstock


List of Figures
List of Tables
Acronyms and Abbreviations
5GFifth generation technology standard for cellular networks
AIChEAmerican Institute of Chemical Engineers
APIAmerican Petroleum Institute
APTAdvanced Persistent Threat
AWIAAmerica's Water Infrastructure Act
BASBuilding Automation System
BMSBurner Management System
BPCSBasic Process Control System
CCPSCenter for Chemical Process Safety
CEMSContinuous Emissions Monitoring Systems
CFATSChemical Facility AntiTerrorism Standards
CFRCode of Federal Regulations
CIRPCybersecurity Incident Response Plan
CISACybersecurity & Infrastructure Security Agency
CISOChief Information Security Officer
CMMSComputerized Maintenance Management Systems
CMRCountermeasure
CMSConfiguration Management Systems
COTSCommercial off the Shelf
CRCCyclic Redundancy Check
CSACybersecurity Assessment
CSMSCybersecurity Management System
CVACybersecurity Vulnerability Assessment
CVSSCommon Vulnerability Scoring System
DCSDistributed Control System
DDoSDistributed Denial of Service
DMZDemilitarized Zone
DNSDomain Name System
DoSDenial of Service
FATFactory Acceptance Test
FERCFederal Energy Regulatory Committee
FMEAFailure Modes and Effects Analysis
HAZOPHazard and Operability Study
HIPPSHigh Integrity Pressure Protection System
HIRAHazard Identification and Risk Analysis
IACSIndustrial Automation and Control Systems
IDSIntrusion Detection System
IECInternational Electrotechnical Commission
IETFInternet Engineering Task Force
IIoT
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Managing Cybersecurity in the Process Industries: A Risk-based Approach»

Look at similar books to Managing Cybersecurity in the Process Industries: A Risk-based Approach. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Managing Cybersecurity in the Process Industries: A Risk-based Approach»

Discussion, reviews of the book Managing Cybersecurity in the Process Industries: A Risk-based Approach and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.