Abstract
A cyber attack on an ICS must begin at an ICS element, and influence some of the other elements. For this reason, we begin the discussion of ICS security by introducing the basic components of ICSs, their functions, variety, and ways in which they connect and interact to produce the intended effects.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Arthur D. Little, Inc. (2006). Market and technology study automotive power electronics 2015, USA. Retrieved September 12, 2015, from http://www.adl.com/uploads/tx_extthoughtleadership/ADL_Study_Power_Electronics_2015.pdf.
Bailey, D., & Wright, E. (2003). Practical SCADA for industry. Vancouver: IDC Technologies.
Chardin, B., Lacombe, J., & Petit, J. (2013). Data historians in the data management landscape. In R. Nambiar & M. Poess (Eds.), Selected topics in performance evaluation and benchmarking (pp. 124–139). New York: Springer.
Galloway, B., & Hancke, G. (2012). Introduction to industrial control networks. Institute of Electrical and Electronic Engineers (IEEE) Communications Surveys & Tutorials, 15(2), 860–880. Retrieved September 8, 2015, from http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6248648.
Hewitson, L., Brown, M., & Balakrishnan, R. (2005). Practical power system protection. Amsterdam, The Netherlands: Newnes.
Instrumentation, Systems, & Automation (ISA) Society. (2004). Functional safety: Instrumented systems for the process industry sector—Part 1: Framework, definitions, system, hardware and software requirements. Research Triangle Park, NC: Instrumentation, Systems, & Automation (ISA) Society. Retrieved June 16, 2015, from https://www.isa.org/pdfs/microsites267/s-840001-pt1/.
International Electrotechnical Commission (IEC). (2003). IEC 61131-3 Programmable controllers—Part 3: Programming languages. Geneva, CH. Retrieved June 16, 2015, from http://d1.amobbs.com/bbs_upload782111/files_31/ourdev_569653.pdf.
Knapp, E. (2011). Industrial network security: Securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems. Waltham, MA: Elsevier.
McDonald, J. (2003). Substation automation: IED integration and availability of information. Institute of Electrical and Electronic Engineers (IEEE) Power & Energy Magazine, 16(2), 181–188. doi:10.1109/MPAE.2003.1192023.
MISO. (2015). Corporate information. Retrieved June 8, 2015, from https://www.misoenergy.org/Library/Repository/Communication%20Material/Corporate/Corporate%20Fact%20Sheet.pdf.
Mostia Jr., B. (2003). The safety instrumented function: An s-word worth knowing. Retrieved September 11, 2015, from http://www2.emersonprocess.com/siteadmincenter/PM%20DeltaV%20Documents/Articles/ControlMagazine/The-Safety-Instrumented-Function-An-S-Word-Worth-Knowing.pdf.
National Institute of Standards and Technology. (2015). Guide to industrial control system (ICS) security (NIST SP 800-82 Rev 2). Gaithersburg, MD. Retrieved from http://dx.doi.org/10.6028/NIST.SP.800-82r2.
National Joint Apprenticeship & Training Committee (NJATC). (2009). Building automation system integration with open protocols. Orland Park, IL: American Technical Publishers.
Sharma, K. (2011). Overview of industrial process automation. Waltham, MA: Elsevier.
Smith, C. (2014). 2014 car hackers handbook. Open Garages, USA. http://opengarages.org/handbook/2014_car_hackers_handbook_compressed.pdf.
Weiss, J. (2010). Protecting industrial control systems from electronic threats. New York: Momentum Press.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Sullivan, D., Luiijf, E., Colbert, E.J.M. (2016). Components of Industrial Control Systems. In: Colbert, E., Kott, A. (eds) Cyber-security of SCADA and Other Industrial Control Systems. Advances in Information Security, vol 66. Springer, Cham. https://doi.org/10.1007/978-3-319-32125-7_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-32125-7_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-32123-3
Online ISBN: 978-3-319-32125-7
eBook Packages: Computer ScienceComputer Science (R0)