Cyber-physical attacks : a growing invisible threat /
Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Oxford :
Butterworth-Heinemann is an imprint of Elsevier,
[2015]
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Front Cover; Cyber-Physical Attacks; Copyright Page; Dedication; Contents; 1 A Cyber-Physical World; Basic Concepts and Definitions of a Cyber-Physical World; Transducers; Controllers; Embedded Systems; Cyber-Physical Systems; The Internet of Things; Defining Cyber-Physical Attacks; Who Should Read This Book; Outline; Chapter 1: A Cyber-Physical World; Chapter 2: A History of Cyber-Physical Security Incidents; Chapter 3: Cyber-Physical Attacks on Implants and Vehicles; Chapter 4: Cyber-Physical Attacks on Industrial Control Systems; Chapter 5: Cyber-Physical Attack Steps.
- Chapter 6: Protection Mechanisms and Secure Design PrinciplesChapter 7: Physical-Cyber Attacks; Summary; Follow-Up Questions and Exercises; 2 A History of Cyber-Physical Security Incidents; Reported Incidents by Sector Affected; Energy; Water; Health; Transportation; Defense; A Discussion on the Cyber-Physical Security Incident Reports; Motivations; Second Order Cyber-Physical Dependencies; The Impact of Cyber-Physical Attacks; Summary; Follow-Up Questions and Exercises; 3 Cyber-Physical Attacks on Implants and Vehicles; Implantable Medical Devices; Insulin Pumps.
- Implantable Cardioverter DefibrillatorsVehicles; Unmanned Aerial Vehicles; Automobiles; Summary; Follow-Up Questions and Exercises; 4 Cyber-Physical Attacks on Industrial Control Systems; SCADA; SCADA Network Vulnerabilities; Factors Affecting SCADA Security; Strict Real-Time Requirements; Continuous Availability; Misguided Security Perceptions; Commercial-off-the-Shelf Hardware and Software; Interconnectivity; Internet Accessibility; Stuxnet: A Milestone in Industrial Control System Security; The Background; The Payload and the Attack; The Delivery; The Impact and the Aftermath.
- The Electric GridPower Generators; The Smart Grid; Summary; Follow-Up Questions and Exercises; 5 Cyber-Physical Attack Steps; Preliminary Research and Reconnaissance; Internet Research; Social Engineering; Watering Hole; Vulnerability Discovery; Intrusion; Full-Body Scanner; Intelligent Traffic Lights; Home Automation; Attack Delivery; Black Hole/Gray Hole; Code Injection; Command Injection; Communication Jamming; Denial of Service; False Data Injection: Communication-Based; False Data Injection: Database-Based; False Data Injection: Sensor-Based; Firmware Modification; Fuzzing; GPS Jamming.
- GPS Spoofing/MeaconingMalware Infection; Man-in-the-Middle; Network Isolation; Packet Sniffing; Password Cracking; Relay Attack; Replay Attack; Rogue Node; Sleep Deprivation; Supply Chain Attack; Antiforensics; Summary; Follow-Up Questions and Exercises; 6 Protection Mechanisms and Secure Design Principles; Protection Mechanisms; Authentication; Access Control; Firewall; Intrusion Detection; Antimalware; Application Whitelisting; Flow Whitelisting; Cryptography; Integrity Verification; Survivability; Secure Design Principles; Economy of Mechanism; Defense-in-Depth; Least-Privilege.