Tài liệu tham khảo |
Loại |
Chi tiết |
[1] Frazer, Roy, Process Measurement and Control – Introduction to Sensors, Communication Adjustment, and Control, Prentice-Hall, Inc., 2001 |
Sách, tạp chí |
Tiêu đề: |
Process Measurement and Control – Introduction to Sensors, Communication Adjustment, and Control |
|
[2] Falco, Joe, et al., IT Security for Industrial Control Systems, NIST IR 6859, 2003, http://www.isd.mel.nist.gov/documents/falco/ITSecurityProcess.pdf |
Sách, tạp chí |
Tiêu đề: |
IT Security for Industrial Control Systems |
|
[3] Bailey, David, and Wright, Edwin, Practical SCADA for Industry, IDC Technologies, 2003 |
Sách, tạp chí |
Tiêu đề: |
Practical SCADA for Industry |
|
[4] Boyer, Stuart, SCADA Supervisory Control and Data Acquisition, 2 nd Edition, ISA, 1999 |
Sách, tạp chí |
Tiêu đề: |
SCADA Supervisory Control and Data Acquisition |
|
[6] Erickson, Kelvin, and Hedrick, John, Plant Wide Process Control, Wiley & Sons, 1999 |
Sách, tạp chí |
Tiêu đề: |
Plant Wide Process Control |
|
[7] Berge, Jonas, Fieldbuses for Process Control: Engineering, Operation, and Maintenance, ISA, 2002 |
Sách, tạp chí |
Tiêu đề: |
Fieldbuses for Process Control: Engineering, Operation, and Maintenance |
|
[8] Peerenboom, James, Analyzing Infrastructure Interdependencies: Overview of Concepts and Terminology, Argonne National Laboratory,http://www.computer.org/portal/web/csdl/doi/10.1109/HICSS.2007.78 |
Sách, tạp chí |
Tiêu đề: |
Analyzing Infrastructure Interdependencies: Overview of Concepts and Terminology |
|
[9] Rinaldi, et al., Identifying, Understanding, and Analyzing Critical Infrastructure Interdependencies, IEEE Control Systems Magazine, 2001, http://www.ce.cmu.edu/~hsm/im2004/readings/CII-Rinaldi.pdf |
Sách, tạp chí |
Tiêu đề: |
Identifying, Understanding, and Analyzing Critical Infrastructure Interdependencies |
|
[10] GAO-04-354, Critical Infrastructure Protection: Challenges and Efforts to Secure Control Systems, U.S. GAO, 2004, http://www.gao.gov/new.items/d04354.pdf |
Sách, tạp chí |
Tiêu đề: |
Critical Infrastructure Protection: Challenges and Efforts to Secure Control Systems |
|
[11] Weiss, Joseph, “Current Status of Cyber Security of Control Systems”, Presentation to Georgia Tech Protective Relay Conference, May 8, 2003 |
Sách, tạp chí |
Tiêu đề: |
Current Status of Cyber Security of Control Systems |
|
[12] Keeney, Michelle et al., Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors, United States Secret Service and Carnegie Mellon Software Institute, 2005,http://www.cert.org/archive/pdf/insidercross051105.pdf |
Sách, tạp chí |
Tiêu đề: |
Insider Threat Study: Computer System Sabotage in Critical Infrastructure Sectors |
|
[15] Federal Information Processing Standards Publication: FIPS 199, Standards for Security Categorization of Federal Information Systems, NIST, 2004,http://csrc.nist.gov/publications/fips/fips199/FIPS-PUB-199-final.pdf |
Sách, tạp chí |
Tiêu đề: |
Standards for Security Categorization of Federal Information Systems |
|
[16] Federal Information Processing Standards Publication: FIPS 200, Minimum Security Requirements for Federal Information Systems, NIST, 2006, http://csrc.nist.gov/publications/fips/fips200/FIPS-200-final-march.pdf |
Sách, tạp chí |
Tiêu đề: |
Minimum Security Requirements for Federal Information Systems |
|
[5] AGA-12, Cryptographic Protection of SCADA Communications, Part 1: Background, Policies and Test Plan, September, 2005,http://www.awwarf.org/research/TopicsAndProjects/Resources/SpecialReports/2969/AGAPart1.pdf |
Link |
|
[13] Federal Information Security Management Act of 2002, Section 301: Information Security, http://csrc.nist.gov/drivers/documents/FISMA-final.pdf |
Link |
|
[14] Federal Information Security Management Act Implementation Project, http://csrc.nist.gov/groups/SMA/fisma/index.html |
Link |
|
[26] NIST Security Configurations Checklists Program for IT Products, http://checklists.nist.gov/ |
Link |
|
[68] Chernick, Michael, et al, NIST SP 800-52, Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations, 2005, http://csrc.nist.gov/publications/PubsSPs.html |
Link |
|
[70] Baker, Elaine, et al., NIST SP 800-57, Recommendation for Key Management, Part 1, Revision 3, 2012, General: http://csrc.nist.gov/publications/PubsSPs.html, Part 2, 2005, Best Practices:http://csrc.nist.gov/publications/PubsSPs.html, Part 3, 2009, Application-Specific:http://csrc.nist.gov/publications/PubsSPs.html |
Link |
|
[73] Internet Security Glossary: RFC 4949, http://www.rfc-editor.org/rfc/rfc4949.txt |
Link |
|