Table of Contents
List of Tables
- Chapter 1
- Chapter 3
- Chapter 4
- Chapter 5
- Chapter 6
- Chapter 7
- Chapter 8
- Chapter 9
- Chapter 10
- Chapter 11
- Chapter 13
- Appendix A
- Appendix B
- Appendix D
List of Illustrations
- Chapter 1
- Chapter 4
- Chapter 6
- Chapter 7
- Chapter 8
- Chapter 9
- Chapter 10
- Chapter 11
- Chapter 12
- Chapter 13
- Appendix B
Guide
Pages
This book is one in a series of process safety guidelines and concept books published by the Center for Chemical Process Safety (CCPS). Refer to www.wiley.com/go/ccps for full list of titles in this series.
It is sincerely hoped that the information presented in this document will lead to a better safety record for the entire industry; however, neither the American Institute of Chemical Engineers, its consultants, CCPS Technical Steering Committee and Subcommittee members, their employers, their employers' officers and directors, nor exida, and its employees and subcontractors warrant or represent, expressly or by implication, the correctness or accuracy of the content of the information presented in this document. As between (1) American Institute of Chemical Engineers, its consultants, CCPS Technical Steering Committee and Subcommittee members, their employers, their employers' officers and directors, and exida and its employees and subcontractors, and (2) the user of this document, the user accepts any legal liability or responsibility whatsoever for the consequence of its use or misuse.
Managing Cybersecurity in the Process Industries
A RiskBased Approach
CENTER FOR CHEMICAL PROCESS SAFETY
of the
AMERICAN INSTITUTE OF CHEMICAL ENGINEERS
120 Wall Street, 23rd Floor New York, NY 10005
This edition first published 2022
2022 the American Institute of Chemical Engineers
A Joint Publication of the American Institute of Chemical Engineers and John Wiley & Sons, Inc.
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by law. Advice on how to obtain permission to reuse material from this title is available at http://www.wiley.com/go/permissions.
The rights of CCPS to be identified as the author of the editorial material in this work have been asserted in accordance with law.
Registered Office
John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, USA
Editorial Office
111 River Street, Hoboken, NJ 07030, USA
For details of our global editorial offices, customer services, and more information about Wiley products visit us at www.wiley.com.
Wiley also publishes its books in a variety of electronic formats and by printondemand. Some content that appears in standard print versions of this book may not be available in other formats.
Limit of Liability/Disclaimer of Warranty
While the publisher and authors have used their best efforts in preparing this work, they make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives, written sales materials or promotional statements for this work. The fact that an organization, website, or product is referred to in this work as a citation and/or potential source of further information does not mean that the publisher and authors endorse the information or service the organization, website, or product may provide or recommendations it may make. This work is sold with the understanding that the publisher is not engaged in rendering professional services. The advice and strategies contained herein may not be suitable for your situation. You should consult with a specialist where appropriate. Further, readers should be aware that websites listed in this work may have changed or disappeared between when this work was written and when it is read. Neither the publisher nor authors shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.
Library of Congress CataloginginPublication Data is Applied for:
ISBN: 9781119861782
Cover Design: Wiley
Cover Images: Alexander Supertramp/Shutterstock, Travel mania/Shutterstock
List of Figures
List of Tables
Acronyms and Abbreviations
5G | Fifth generation technology standard for cellular networks |
---|
AIChE | American Institute of Chemical Engineers |
API | American Petroleum Institute |
APT | Advanced Persistent Threat |
AWIA | America's Water Infrastructure Act |
BAS | Building Automation System |
BMS | Burner Management System |
BPCS | Basic Process Control System |
CCPS | Center for Chemical Process Safety |
CEMS | Continuous Emissions Monitoring Systems |
CFATS | Chemical Facility AntiTerrorism Standards |
CFR | Code of Federal Regulations |
CIRP | Cybersecurity Incident Response Plan |
CISA | Cybersecurity & Infrastructure Security Agency |
CISO | Chief Information Security Officer |
CMMS | Computerized Maintenance Management Systems |
CMR | Countermeasure |
CMS | Configuration Management Systems |
COTS | Commercial off the Shelf |
CRC | Cyclic Redundancy Check |
CSA | Cybersecurity Assessment |
CSMS | Cybersecurity Management System |
CVA | Cybersecurity Vulnerability Assessment |
CVSS | Common Vulnerability Scoring System |
DCS | Distributed Control System |
DDoS | Distributed Denial of Service |
DMZ | Demilitarized Zone |
DNS | Domain Name System |
DoS | Denial of Service |
FAT | Factory Acceptance Test |
FERC | Federal Energy Regulatory Committee |
FMEA | Failure Modes and Effects Analysis |
HAZOP | Hazard and Operability Study |
HIPPS | High Integrity Pressure Protection System |
HIRA | Hazard Identification and Risk Analysis |
IACS | Industrial Automation and Control Systems |
IDS | Intrusion Detection System |
IEC | International Electrotechnical Commission |
IETF | Internet Engineering Task Force |
IIoT | |
Next page