|
1. 賴溪松,資訊安全稽核,http://www.fin.ncku.edu.tw/ch/data/94/94semeior/%E8%B3%87%E8%A8%8A%E5%AE%89%E5%85%A8%E7%A8%BD%E6%A0%B8.ppt 2. Daecy, F. (2003), “Critical Infrastructure Protection - Challenges in Securing Control System”, United States General Accounting Office 3. Hahn, J., Guillen D. and Anderson T. (2005), “Process Control Systems in the Chemical Industry:Safety vs. Security”, 20th Annual CCPS International Conference 4. Geer, D. (2006), “Security of Critical Control Systems Sparks Concern”, IEEE Computer Society, Technology News, pp.20-23 5. Idaho National Laboratory (2006), “Control System Cyber Security - Defense in Depth Strategies”, Control Systems Security Center, U.S. Department of Homeland Security 6. Butchko, B. (2006), “Cyber and Process Control Security”, Butchko Security Solutions 7. Henderson,I. (2005), “Process Control Security - The bp Experience”, Process Control System Forum Spring Meeting 8. National Infrastructure Security Co-Ordination Centre (2006), “Good Practice Guide – Process Control and SCADA Security” 9. Emerson (2006),“Security Assessment Service” 10. 樊國楨 (2007),“重要民生基礎建設資訊分享與分析中心初探” 11. Finco, G., Lee, K., Miller, G., Tebbe, J. and Wells, R. (2007), “Cyber Security Procurement Language for Control Systems Version 1.6”, Idaho National Laboratory Critical Infrastructure Protection/Resilience Center 12. Stamp, J., Dillinger, J., Young, W. and Depoy, J. (2003), “Common Vulnerabilities in Critical Infrastructure Control System”, Sandia National Laboratories 13. Stouffer, K., Falco, J. and Scarfone, K. (2007), “Guide to Industrial Control Systems (ICS) Security”, National Institute of Standards and Technology 14. IBM Internet Security Systems (2007), “A Strategic Approach to Protecting SCADA and Process Control Systems” 15. Saydjari, O. (2005), “Trend in Process Control Systems Security”, IEEE Computer Society, IEEE SECURITY & PRIVACY, pp.57-60 16. PA Consulting Group, National Infrastructure Security Co-ordination Centre (2005), “Good Practice Guide - Process Control and SCADA Security” 17. Nash, T. (2005), “An Undirected Attack Against Critical Infrastructure - A Case Study for Improving Your Control System Security”, Lawrence Livermore National Laboratory 18. U.S. Department of Energy, “21 Steps to Improve Cyber Security of SCADA Networks” 19. Nash, T.(2003), “Critical Infrastructure : Control Systems and the Terrorist Threat”, Congressional Research Service 20. The Instrumentation, Systems and Automation Society (2006), “Mitigations for Security Vulnerabilities Found in Control System Networks”, 16th Annual Joint ISA POWID/EPRI Controls and Instrumentation Conference 21. Clark, R. (2005), “Security Considerations in Process Control and SCADA Environments”, The Instrumentation, Systems and Automation Society, ISA EXPO 2005 22. American Petroleum Institute, National Petrochemical & Refiners Association (2004), “Security Vulnerability Assessment Methodology for the Petroleum and Petrochemical Industries” 23. Kertzner, P., Bodeau, D. and Nitschke, R. (2005), “Process Control System Security Technical Risk Assessment : Analysis of Problem Domain”, Institue for Information Infrastructure Protection (I3P) 24. McCue, A., (2008), “Beware the insider security threat”, CIO Jury Article,http://www.silicon.com/ciojury/0,3800003161,39188671,00.htm 25. National Infrastructure Security Co-Ordination Centre (2006), “Good Practice Guide Process Control and SCADA Security - Guide 3. Establish response capabilities” 26. Byres, E. and Hoffman, D. (2004), “The Myths and Facts behind Cyber Security Risks for Industrial Control System”, PA Consulting Group 27. Peterson, D. (2004), “Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks”, The Instrumentation, Systems and Automation Society 28. Idaho National Laboratory (2005), “Common Control System Vulnerability”, Control Systems Security Center, U.S. Department of Homeland Security 29. McAfee (2005), “Mitigating the Top 10 Network Security Risks in SCADA and Process” 30. Pangemanan, D. (2005), “Cyber Security Overview - Protecting Control Layer of Plant Automation and Control System”, Honeywell Inc. 31. http://www.theregister.co.uk/2004/03/16/explosive_cold_war_trojan_has/ 32. http://news.bbc.co.uk/1/hi/technology/3682803.stm 33. http://www.iranvajahan.net/cgi-bin/news.pl?l=en&y=2003&m=10&d=03&a=1 34. http://zh.wikipedia.org/w/index.php?title=Router&variant=zh-tw 35. http://www.i-security.tw/learn/learn_az.asp?Code=F 36. Conklin, A., White, G., Cothren, C., Williams, D. and Davis, R. (2006), “Principles of Computer Security – Security+ and Beyond”, McGraw-Hill Technology Education, Burr Ridge, Illinois. 37. http://zh.wikipedia.org/w/index.php?title=%E8%AE%8A%E6%9B%B4%E7%AE%A1%E7%90%86&variant=zh-tw 38. 黃承聖(2000),企業資訊安全的起點-資訊安全政策,網路通訊 39. 洪國興、季延平與趙榮耀(2003),組織制定資訊安全政策對資訊安全影響之研究
|