Cargando…

Cyber-physical attacks : a growing invisible threat /

Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Loukas, George (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Oxford : Butterworth-Heinemann is an imprint of Elsevier, [2015]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 SCIDIR_ocn910102749
003 OCoLC
005 20231120111958.0
006 m o d
007 cr cnu|||unuuu
008 150526s2015 enk ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d IDEBK  |d OPELS  |d YDXCP  |d TEFOD  |d E7B  |d EBLCP  |d NLGGC  |d DEBSZ  |d CDX  |d TEFOD  |d OCLCF  |d VLB  |d OCLCQ  |d MERUC  |d WRM  |d U3W  |d OCLCQ  |d AU@  |d LQU  |d UKMGB  |d OCLCQ  |d SFB  |d VLY  |d REDDC  |d OCLCO  |d OCLCQ 
015 |a GBB581923  |2 bnb 
016 7 |a 017410280  |2 Uk 
019 |a 910446918  |a 1105186591  |a 1105567313  |a 1162051877  |a 1229061733  |a 1229131816 
020 |a 9780128014639  |q (electronic bk.) 
020 |a 0128014636  |q (electronic bk.) 
020 |a 0128012900 
020 |a 9780128012901 
020 |z 9780128012901 
035 |a (OCoLC)910102749  |z (OCoLC)910446918  |z (OCoLC)1105186591  |z (OCoLC)1105567313  |z (OCoLC)1162051877  |z (OCoLC)1229061733  |z (OCoLC)1229131816 
050 4 |a QA76.9.A25  |b L68 2015eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
100 1 |a Loukas, George,  |e author. 
245 1 0 |a Cyber-physical attacks :  |b a growing invisible threat /  |c George Loukas. 
264 1 |a Oxford :  |b Butterworth-Heinemann is an imprint of Elsevier,  |c [2015] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from PDF title page (Ebsco, viewed May 27, 2015). 
504 |a Includes bibliographical references and index. 
520 |a Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral outrage that would follow a more overt physical attack. Readers will learn about all aspects of this brave new world of cyber-physical attacks, along with tactics on how to defend against them. The book provides an accessible introduction to the variety of cyber-physical attacks that have already been employed or are likely to be employed in the near future. 
505 0 |a Front Cover; Cyber-Physical Attacks; Copyright Page; Dedication; Contents; 1 A Cyber-Physical World; Basic Concepts and Definitions of a Cyber-Physical World; Transducers; Controllers; Embedded Systems; Cyber-Physical Systems; The Internet of Things; Defining Cyber-Physical Attacks; Who Should Read This Book; Outline; Chapter 1: A Cyber-Physical World; Chapter 2: A History of Cyber-Physical Security Incidents; Chapter 3: Cyber-Physical Attacks on Implants and Vehicles; Chapter 4: Cyber-Physical Attacks on Industrial Control Systems; Chapter 5: Cyber-Physical Attack Steps. 
505 8 |a Chapter 6: Protection Mechanisms and Secure Design PrinciplesChapter 7: Physical-Cyber Attacks; Summary; Follow-Up Questions and Exercises; 2 A History of Cyber-Physical Security Incidents; Reported Incidents by Sector Affected; Energy; Water; Health; Transportation; Defense; A Discussion on the Cyber-Physical Security Incident Reports; Motivations; Second Order Cyber-Physical Dependencies; The Impact of Cyber-Physical Attacks; Summary; Follow-Up Questions and Exercises; 3 Cyber-Physical Attacks on Implants and Vehicles; Implantable Medical Devices; Insulin Pumps. 
505 8 |a Implantable Cardioverter DefibrillatorsVehicles; Unmanned Aerial Vehicles; Automobiles; Summary; Follow-Up Questions and Exercises; 4 Cyber-Physical Attacks on Industrial Control Systems; SCADA; SCADA Network Vulnerabilities; Factors Affecting SCADA Security; Strict Real-Time Requirements; Continuous Availability; Misguided Security Perceptions; Commercial-off-the-Shelf Hardware and Software; Interconnectivity; Internet Accessibility; Stuxnet: A Milestone in Industrial Control System Security; The Background; The Payload and the Attack; The Delivery; The Impact and the Aftermath. 
505 8 |a The Electric GridPower Generators; The Smart Grid; Summary; Follow-Up Questions and Exercises; 5 Cyber-Physical Attack Steps; Preliminary Research and Reconnaissance; Internet Research; Social Engineering; Watering Hole; Vulnerability Discovery; Intrusion; Full-Body Scanner; Intelligent Traffic Lights; Home Automation; Attack Delivery; Black Hole/Gray Hole; Code Injection; Command Injection; Communication Jamming; Denial of Service; False Data Injection: Communication-Based; False Data Injection: Database-Based; False Data Injection: Sensor-Based; Firmware Modification; Fuzzing; GPS Jamming. 
505 8 |a GPS Spoofing/MeaconingMalware Infection; Man-in-the-Middle; Network Isolation; Packet Sniffing; Password Cracking; Relay Attack; Replay Attack; Rogue Node; Sleep Deprivation; Supply Chain Attack; Antiforensics; Summary; Follow-Up Questions and Exercises; 6 Protection Mechanisms and Secure Design Principles; Protection Mechanisms; Authentication; Access Control; Firewall; Intrusion Detection; Antimalware; Application Whitelisting; Flow Whitelisting; Cryptography; Integrity Verification; Survivability; Secure Design Principles; Economy of Mechanism; Defense-in-Depth; Least-Privilege. 
546 |a English. 
650 0 |a Cyber intelligence (Computer security) 
650 0 |a Ubiquitous computing. 
650 0 |a Embedded computer systems. 
650 0 |a Embedded Internet devices. 
650 0 |a Internet of things. 
650 6 |a Surveillance des menaces informatiques.  |0 (CaQQLa)000288256 
650 6 |a Informatique omnipr�esente.  |0 (CaQQLa)201-0371302 
650 6 |a Syst�emes enfouis (Informatique)  |0 (CaQQLa)201-0171574 
650 6 |a Internet int�egr�e.  |0 (CaQQLa)000284368 
650 6 |a Internet des objets.  |0 (CaQQLa)000269177 
650 7 |a COMPUTERS  |x Internet Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Cyber intelligence (Computer security)  |2 fast  |0 (OCoLC)fst01893401 
650 7 |a Embedded computer systems.  |2 fast  |0 (OCoLC)fst00908298 
650 7 |a Embedded Internet devices.  |2 fast  |0 (OCoLC)fst01742162 
650 7 |a Internet of things.  |2 fast  |0 (OCoLC)fst01894151 
650 7 |a Ubiquitous computing.  |2 fast  |0 (OCoLC)fst01160283 
776 0 8 |i Print version:  |a Loukas, George.  |t Cyber-Physical Attacks : A Growing Invisible Threat.  |d Burlington : Elsevier Science, �2015  |z 9780128012901 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780128012901  |z Texto completo