Industrial Controls Security Industrial Controls Security

Industrial Controls Security

James Eaton and Others

Publisher Description

As cybersecurity threats evolve, we must adapt the way to fight them. The typical countermeasures are no longer adequate, given that advanced persistent threats (APTs) are the most imminent attacks that we face today.

This IBM® Redguide™ publication explains why industrial installations are an attractive target and why it is so important to protect them in a new way. To help you better understand what you might be facing, we explain how attacks work, who the potential attackers are, what they want to achieve, and how they work to achieve it. We give you insights into a world that seems like science fiction but is today's reality and a reality that threatens your organization. We also show you how to fight back and explain how IBM can help shield your organization from harm.

Our goal is for you to understand what the current threat landscape looks like and what you can do to protect your assets.

GENRE
Computers & Internet
RELEASED
2016
January 6
LANGUAGE
EN
English
LENGTH
28
Pages
PUBLISHER
IBM Redbooks
SELLER
International Business Machines Corp
SIZE
404.5
KB

More Books Like This

Managing Risk and Information Security Managing Risk and Information Security
2013
Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security
2020
Mastering Your Introduction to Cyber Security Mastering Your Introduction to Cyber Security
2018
Cyber-Terrorism Cyber-Terrorism
2014
CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002) CompTIA CySA+ Cybersecurity Analyst Certification All-in-One Exam Guide, Second Edition (Exam CS0-002)
2020
The Path of Least Resistance: Computer Security Is Common Sense The Path of Least Resistance: Computer Security Is Common Sense
2012

Customers Also Bought

Cyber-Terrorism Cyber-Terrorism
2014
Cyber-Security in Healthcare Cyber-Security in Healthcare
2015
CyberSecurity for the Digitally Challenged CyberSecurity for the Digitally Challenged
2020
Finance: Cloud Computing, Cyber Security and Cyber Heist Finance: Cloud Computing, Cyber Security and Cyber Heist
2015
Cyber Security: It's Personal Cyber Security: It's Personal
2017
Managing Risk and Information Security Managing Risk and Information Security
2013