Cargando…

Cyber-physical attack recovery procedures : a step-by-step preparation and response guide /

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and a...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Ayala, Luis (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [New York] : Apress, [2016]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn953694523
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 160718s2016 nyua o 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d DEBBG  |d DEBSZ  |d OCLCA  |d OCLCF  |d CEF  |d OCLCQ  |d REB  |d UAB  |d HS0  |d OCLCO  |d OCLCQ 
019 |a 993998508  |a 1165381536 
020 |a 1484220641 
020 |a 9781484220641 
020 |z 9781484220641 
020 |a 148422065X 
020 |a 9781484220658 
024 7 |a 10.1007/978-1-4842-2065-8.  |2 doi 
029 1 |a DEBBG  |b BV043969800 
029 1 |a DEBSZ  |b 485803291 
029 1 |a GBVCP  |b 882757954 
035 |a (OCoLC)953694523  |z (OCoLC)993998508  |z (OCoLC)1165381536 
037 |a CL0500000763  |b Safari Books Online 
050 4 |a QA76.9.A25 
072 7 |a UK.  |2 bicssc 
072 7 |a COM067000.  |2 bisacsh 
082 0 4 |a 004  |2 23 
049 |a UAMI 
100 1 |a Ayala, Luis,  |e author. 
245 1 0 |a Cyber-physical attack recovery procedures :  |b a step-by-step preparation and response guide /  |c Luis Ayala. 
264 1 |a [New York] :  |b Apress,  |c [2016] 
264 2 |a New York, NY :  |b Distributed to the Book trade worldwide by Springer Science+Business Media New York 
264 4 |c ©2016 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from cover (Safari, viewed July 15, 2016). 
500 |a Place of publication from publisher's Web site. 
505 0 |a Chapter 1: Cyber-Physical Attack Recovery Procedures -- Chapter 2: Threats and Attack Detection -- Chapter 3: Prevent Hackers from Destroying a Boiler -- Chapter 4: Prevent Hackers from Destroying a Pressure Vessel -- Chapter 5: Prevent Hackers from Destroying Chillers -- Chapter 6: Prevent Hackers from Destroying a Gas Fuel Train -- Chapter 7: Prevent Hackers from Destroying a Cooling Tower -- Chapter 8: Preventing Hackers from Destroying a Backup Generator -- Chapter 9: Prevent Hackers from Destroying Switchgear -- Chapter 10: Eight Steps to Defend Building Control Systems -- Chapter 11: Block Hacker Surveillance of your Buildings -- Chapter 12: Cyber-Physical Attack Recovery Procedures Template. 
520 |a This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time--even from the other side of the planet. Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably won't suspect it was a hacker--until you see a pattern. The building control system (BCS) will act "squirrelly" and you will know--it really is a cyber-physical attack. Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your employees and the local community. Cyber-Physical Attack Recovery Procedures provides a detailed guide to taking the right steps ahead of time, and equipping your facility and employees with the training, knowledge, and tools they need and may save lives. The book contains: A one-of-a-kind action plan describing how hackers attack building equipment, the extent of damage possible, and how to respond when a cyber-physical attack occurs. Detailed descriptions of cyber-physical attacks directed against SCADA systems or building controls, as well as cyber booby traps and cyber drone attacks. Invaluable appendices, including: Emergency Procedures, Team Staffing and Tasking, Alternate Site Procedures, a Documentation List, Software and Hardware Inventories, Vendor Contact Lists, External Support Agreements, and much more. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Cooperating objects (Computer systems)  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Computer crimes  |x Investigation. 
650 6 |a Objets coopérants (Systèmes informatiques)  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Criminalité informatique  |x Enquêtes. 
650 7 |a Computer crimes  |x Investigation.  |2 fast  |0 (OCoLC)fst00872065 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
776 |z 1-4842-2064-1 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484220658/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP