Jump to ratings and reviews
Rate this book

Securing Operational Technology - The Purdue Model: Cybersecurity for Operational Technology: A Unified Approach Using the Purdue Model

Rate this book
"Securing Operational Technology" presents an in-depth exploration of the Purdue Model, an essential framework that categorises OT systems into six distinctive levels. Each level, ranging from the sensory and actuating elements to enterprise resource planning systems, is meticulously dissected, with its unique security needs and control requirements detailed. Beyond the mere theoretical presentation, the book offers a prescriptive approach, furnishing readers with a roadmap to secure each layer of the OT environment. This intricate guide is rooted in the principle of defence-in-depth, advocating for the deployment of multiple security controls to construct a robust fortress against a spectrum of cyber threats. The book also illuminates the indispensable role of collaboration between IT and OT teams, emphasising how synergy between the two can lead to a comprehensive understanding of vulnerabilities and the implementation of effective security measures. Moreover, it explores real-world scenarios, providing examples such as the secure remote access via cloud platforms or the configuration of Programmable Logic Controllers (PLCs) by remote vendor support. These practical instances transform abstract concepts into tangible solutions, fostering a more profound understanding of the subject. As a resource, "Securing Operational Technology" stands as a beacon for process control engineers, students, technology professionals, and cybersecurity experts, demystifying the intricacies of OT security. It offers an approachable, engaging, and comprehensive guide to secure OT systems, enabling professionals to strengthen their defenses against the ever-evolving cyber threats. This book is a must-read for anyone invested in securing our vital infrastructures and contributing to the resilience of our societies.

Chapter 1: Introduction Chapter 2: A Closer look at the Purdue Model Chapter 3: Understanding Cybersecurity Chapter 4: The Intersection of Operational Technology and Cybersecurity Chapter 5: The Purdue Model Approach to Cybersecurity Chapter 6: The Role of Process Control Engineers in Cybersecurity Chapter 7: The Importance of Cybersecurity Training Chapter 8: Conclusion Recap of Key Points Final Thoughts and Recommendations

92 pages, Hardcover

Published August 17, 2023

About the author

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
0 (0%)
4 stars
0 (0%)
3 stars
0 (0%)
2 stars
0 (0%)
1 star
0 (0%)
No one has reviewed this book yet.

Can't find what you're looking for?

Get help and learn more about the design.