語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
查詢
讀者園地
我的帳戶
簡單查詢
進階查詢
指定參考書
新書通報
新書書單RSS
個人資料
儲存檢索策略
薦購
預約/借閱記錄查詢
訊息
評論
個人書籤
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyber-physical attack recovery proce...
~
Ayala, Luis.
Cyber-physical attack recovery procedures[electronic resource] :a step-by-step preparation and response guide /
紀錄類型:
書目-電子資源 : Monograph/item
杜威分類號:
005.8
書名/作者:
Cyber-physical attack recovery procedures : a step-by-step preparation and response guide // by Luis Ayala.
作者:
Ayala, Luis.
出版者:
Berkeley, CA : : Apress :, 2016.
面頁冊數:
xx, 159 p. : : ill. (some col.), digital ;; 24 cm.
Contained By:
Springer eBooks
標題:
Cooperating objects (Computer systems) - Security measures.
標題:
Computer security.
標題:
Computer Science.
標題:
Computer Hardware.
標題:
Systems and Data Security.
標題:
Data Encryption.
標題:
Computer Communication Networks.
ISBN:
9781484220658
ISBN:
9781484220641
內容註:
Chapter 1: Cyber-Physical Attack Recovery Procedures -- Chapter 2: Threats and Attack Detection -- Chapter 3: Prevent Hackers from Destroying a Boiler -- Chapter 4: Prevent Hackers from Destroying a Pressure Vessel -- Chapter 5: Prevent Hackers from Destroying Chillers -- Chapter 6: Prevent Hackers from Destroying a Gas Fuel Train -- Chapter 7: Prevent Hackers from Destroying a Cooling Tower -- Chapter 8: Preventing Hackers from Destroying a Backup Generator -- Chapter 9: Prevent Hackers from Destroying Switchgear -- Chapter 10: Eight Steps to Defend Building Control Systems -- Chapter 11: Block Hacker Surveillance of your Buildings -- Chapter 12: Cyber-Physical Attack Recovery Procedures Template.
摘要、提要註:
This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time--even from the other side of the planet. Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably won't suspect it was a hacker--until you see a pattern. The building control system (BCS) will act "squirrelly" and you will know--it really is a cyber-physical attack. Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your employees and the local community. Cyber-Physical Attack Recovery Procedures provides a detailed guide to taking the right steps ahead of time, and equipping your facility and employees with the training, knowledge, and tools they need and may save lives. The book contains: A one-of-a-kind action plan describing how hackers attack building equipment, the extent of damage possible, and how to respond when a cyber-physical attack occurs. Detailed descriptions of cyber-physical attacks directed against SCADA systems or building controls, as well as cyber booby traps and cyber drone attacks. Invaluable appendices, including: Emergency Procedures, Team Staffing and Tasking, Alternate Site Procedures, a Documentation List, Software and Hardware Inventories, Vendor Contact Lists, External Support Agreements, and much more.
電子資源:
http://dx.doi.org/10.1007/978-1-4842-2065-8
Cyber-physical attack recovery procedures[electronic resource] :a step-by-step preparation and response guide /
Ayala, Luis.
Cyber-physical attack recovery procedures
a step-by-step preparation and response guide /[electronic resource] :by Luis Ayala. - Berkeley, CA :Apress :2016. - xx, 159 p. :ill. (some col.), digital ;24 cm.
Chapter 1: Cyber-Physical Attack Recovery Procedures -- Chapter 2: Threats and Attack Detection -- Chapter 3: Prevent Hackers from Destroying a Boiler -- Chapter 4: Prevent Hackers from Destroying a Pressure Vessel -- Chapter 5: Prevent Hackers from Destroying Chillers -- Chapter 6: Prevent Hackers from Destroying a Gas Fuel Train -- Chapter 7: Prevent Hackers from Destroying a Cooling Tower -- Chapter 8: Preventing Hackers from Destroying a Backup Generator -- Chapter 9: Prevent Hackers from Destroying Switchgear -- Chapter 10: Eight Steps to Defend Building Control Systems -- Chapter 11: Block Hacker Surveillance of your Buildings -- Chapter 12: Cyber-Physical Attack Recovery Procedures Template.
This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time--even from the other side of the planet. Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably won't suspect it was a hacker--until you see a pattern. The building control system (BCS) will act "squirrelly" and you will know--it really is a cyber-physical attack. Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your employees and the local community. Cyber-Physical Attack Recovery Procedures provides a detailed guide to taking the right steps ahead of time, and equipping your facility and employees with the training, knowledge, and tools they need and may save lives. The book contains: A one-of-a-kind action plan describing how hackers attack building equipment, the extent of damage possible, and how to respond when a cyber-physical attack occurs. Detailed descriptions of cyber-physical attacks directed against SCADA systems or building controls, as well as cyber booby traps and cyber drone attacks. Invaluable appendices, including: Emergency Procedures, Team Staffing and Tasking, Alternate Site Procedures, a Documentation List, Software and Hardware Inventories, Vendor Contact Lists, External Support Agreements, and much more.
ISBN: 9781484220658
Standard No.: 10.1007/978-1-4842-2065-8doiSubjects--Topical Terms:
660721
Cooperating objects (Computer systems)
--Security measures.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Cyber-physical attack recovery procedures[electronic resource] :a step-by-step preparation and response guide /
LDR
:03507nmm a2200313 a 4500
001
459070
003
DE-He213
005
20161202162430.0
006
m d
007
cr nn 008maaau
008
170113s2016 cau s 0 eng d
020
$a
9781484220658
$q
(electronic bk.)
020
$a
9781484220641
$q
(paper)
024
7
$a
10.1007/978-1-4842-2065-8
$2
doi
035
$a
978-1-4842-2065-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UK
$2
bicssc
072
7
$a
COM067000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
A973 2016
100
1
$a
Ayala, Luis.
$3
660720
245
1 0
$a
Cyber-physical attack recovery procedures
$h
[electronic resource] :
$b
a step-by-step preparation and response guide /
$c
by Luis Ayala.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2016.
300
$a
xx, 159 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
505
0
$a
Chapter 1: Cyber-Physical Attack Recovery Procedures -- Chapter 2: Threats and Attack Detection -- Chapter 3: Prevent Hackers from Destroying a Boiler -- Chapter 4: Prevent Hackers from Destroying a Pressure Vessel -- Chapter 5: Prevent Hackers from Destroying Chillers -- Chapter 6: Prevent Hackers from Destroying a Gas Fuel Train -- Chapter 7: Prevent Hackers from Destroying a Cooling Tower -- Chapter 8: Preventing Hackers from Destroying a Backup Generator -- Chapter 9: Prevent Hackers from Destroying Switchgear -- Chapter 10: Eight Steps to Defend Building Control Systems -- Chapter 11: Block Hacker Surveillance of your Buildings -- Chapter 12: Cyber-Physical Attack Recovery Procedures Template.
520
$a
This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time--even from the other side of the planet. Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably won't suspect it was a hacker--until you see a pattern. The building control system (BCS) will act "squirrelly" and you will know--it really is a cyber-physical attack. Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your employees and the local community. Cyber-Physical Attack Recovery Procedures provides a detailed guide to taking the right steps ahead of time, and equipping your facility and employees with the training, knowledge, and tools they need and may save lives. The book contains: A one-of-a-kind action plan describing how hackers attack building equipment, the extent of damage possible, and how to respond when a cyber-physical attack occurs. Detailed descriptions of cyber-physical attacks directed against SCADA systems or building controls, as well as cyber booby traps and cyber drone attacks. Invaluable appendices, including: Emergency Procedures, Team Staffing and Tasking, Alternate Site Procedures, a Documentation List, Software and Hardware Inventories, Vendor Contact Lists, External Support Agreements, and much more.
650
0
$a
Cooperating objects (Computer systems)
$x
Security measures.
$3
660721
650
0
$a
Computer security.
$3
338952
650
1 4
$a
Computer Science.
$3
423143
650
2 4
$a
Computer Hardware.
$3
465514
650
2 4
$a
Systems and Data Security.
$3
466229
650
2 4
$a
Data Encryption.
$3
465773
650
2 4
$a
Computer Communication Networks.
$3
464535
710
2
$a
SpringerLink (Online service)
$3
463450
773
0
$t
Springer eBooks
856
4 0
$u
http://dx.doi.org/10.1007/978-1-4842-2065-8
950
$a
Professional and Applied Computing (Springer-12059)
筆 0 讀者評論
多媒體
多媒體檔案
http://dx.doi.org/10.1007/978-1-4842-2065-8
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入