Front Matter
Introduction, Background, and History of Cybersecurity. Purpose of this Book
Types of Cyber-Attacks, Who Engages in Them and Why
Types of Risk Receptors/Targets
Threat Sources and Types of Attacks
Who Could Create a Cyber Risk? Insider vs. Outsider Threats
Case Histories
Integrating Cybersecurity Management into the Process Safety Framework. General Model for Understanding Cybersecurity Risk
Designing a Secure Industrial Automation and Control System
Hazard Identification and Risk Analysis (HIRA)
Manage the Risk
Implementing a Holistic Approach to Safety and Cybersecurity
Where Do We Go from Here?. What's Next? A Look at Future Development Opportunities
Available Resources
Excerpt from NIST Cybersecurity Framework
Detailed Cybersecurity PHA and LOPA Example
Example Cybersecurity Metrics
Cybersecurity Sample Audit Question List
Management System Review Examples
References
Index