Managing cybersecurity in the process industries / Center for Chemical Process Safety of the American Institute of Chemical Engineers.

Language: English Publisher: Hoboken, NJ : Wiley, 2022Description: 1 online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9781119861782; 9781119861812 ; 1119861810Subject(s): Chemical processes -- Security measures | Computer security | Computer SecurityGenre/Form: Electronic books.DDC classification: 660/.28 LOC classification: TP155.7Online resources: Full text available at Wiley Online Library Click here to view.
Contents:
Front Matter -- Introduction, Background, and History of Cybersecurity. Purpose of this Book -- Types of Cyber-Attacks, Who Engages in Them and Why -- Types of Risk Receptors/Targets -- Threat Sources and Types of Attacks -- Who Could Create a Cyber Risk? Insider vs. Outsider Threats -- Case Histories -- Integrating Cybersecurity Management into the Process Safety Framework. General Model for Understanding Cybersecurity Risk -- Designing a Secure Industrial Automation and Control System -- Hazard Identification and Risk Analysis (HIRA) -- Manage the Risk -- Implementing a Holistic Approach to Safety and Cybersecurity -- Where Do We Go from Here?. What's Next? A Look at Future Development Opportunities -- Available Resources -- Excerpt from NIST Cybersecurity Framework -- Detailed Cybersecurity PHA and LOPA Example -- Example Cybersecurity Metrics -- Cybersecurity Sample Audit Question List -- Management System Review Examples -- References -- Index.
Summary: The chemical process industry is a rich target for cyber attackers who are intent on causing harm. Current risk management techniques are based on the premise that events are initiated by a single failure and the succeeding sequence of events is predictable. A cyberattack on the Safety, Controls, Alarms, and Interlocks (SCAI) undermines this basic assumption. Each facility should have a Cybersecurity Policy, Implementation Plan and Threat Response Plan in place. The response plan should address how to bring the process to a safe state when controls and safety systems are compromised. The emergency response plan should be updated to reflect different actions that may be appropriate in a sabotage situation. IT professionals, even those working at chemical facilities are primarily focused on the risk to business systems. This book contains guidelines for companies on how to improve their process safety performance by applying Risk Based Process Safety (RBPS) concepts and techniques to the problem of cybersecurity.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)

Includes bibliographical references and index.

Front Matter -- Introduction, Background, and History of Cybersecurity. Purpose of this Book -- Types of Cyber-Attacks, Who Engages in Them and Why -- Types of Risk Receptors/Targets -- Threat Sources and Types of Attacks -- Who Could Create a Cyber Risk? Insider vs. Outsider Threats -- Case Histories -- Integrating Cybersecurity Management into the Process Safety Framework. General Model for Understanding Cybersecurity Risk -- Designing a Secure Industrial Automation and Control System -- Hazard Identification and Risk Analysis (HIRA) -- Manage the Risk -- Implementing a Holistic Approach to Safety and Cybersecurity -- Where Do We Go from Here?. What's Next? A Look at Future Development Opportunities -- Available Resources -- Excerpt from NIST Cybersecurity Framework -- Detailed Cybersecurity PHA and LOPA Example -- Example Cybersecurity Metrics -- Cybersecurity Sample Audit Question List -- Management System Review Examples -- References -- Index.

The chemical process industry is a rich target for cyber attackers who are intent on causing harm. Current risk management techniques are based on the premise that events are initiated by a single failure and the succeeding sequence of events is predictable. A cyberattack on the Safety, Controls, Alarms, and Interlocks (SCAI) undermines this basic assumption. Each facility should have a Cybersecurity Policy, Implementation Plan and Threat Response Plan in place. The response plan should address how to bring the process to a safe state when controls and safety systems are compromised. The emergency response plan should be updated to reflect different actions that may be appropriate in a sabotage situation. IT professionals, even those working at chemical facilities are primarily focused on the risk to business systems. This book contains guidelines for companies on how to improve their process safety performance by applying Risk Based Process Safety (RBPS) concepts and techniques to the problem of cybersecurity.

About the Author
The Center for Chemical Process Safety (CCPS) has been the world leader in developing and disseminating information on process safety management and technology since 1985. The CCPS, an industry technology alliance of the American Institute of Chemical Engineers (AIChE), has published over 100 books in its process safety guidelines and process safety concepts series, and over 30 training modules through its Safety and Chemical Engineering Education (SAChE) series. CCPS is supported by the contributions and voluntary participation of more than 200 companies globally.

There are no comments for this item.

to post a comment.