Vibox

Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Respon

Description: Cyber-Physical Attack Recovery Procedures by Luis Ayala "Provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely"--Back cover. FORMAT Paperback LANGUAGE English CONDITION Brand New Publisher Description This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time—even from the other side of the planet.Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably wont suspect it was a hacker—until you see a pattern. The building control system (BCS) will act "squirrelly" and you will know—it really is a cyber-physical attack.Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your employees and the local community. Cyber-Physical Attack Recovery Procedures provides a detailed guide to taking the right steps ahead of time, and equipping your facility and employees with the training, knowledge, and tools they need and may save lives. The book contains:A one-of-a-kind action plan describing how hackers attack building equipment, the extent of damage possible, and how to respond when a cyber-physical attack occurs.Detailed descriptions of cyber-physical attacks directed against SCADA systems or building controls, as well as cyber booby traps Invaluable appendices, including: Emergency Procedures, Team Staffing and Tasking, Alternate Site Procedures, a Documentation List, Software and Hardware Inventories, Vendor Contact Lists, External Support Agreements, and much more. What youll learnPossible ways hackers cancause building equipment to fail.How to quickly assess the threat to his facilities in real time, how to stop a cyber-physical attack.How to restore equipment operation without doing any more damage.Who This Book Is ForArchitects, Engineers, Building Managers, Students, Researchers and Consultants interested in cybersecurity-attacks against facilities in the real world. Also for IT professionals getting involved in cybersecurity responsibilities. Back Cover This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time--even from the other side of the planet. Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably wont suspect it was a hacker--until you see a pattern. The building control system (BCS) will act "squirrelly" and you will know--it really is a cyber-physical attack. Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your employees and the local community. Cyber-Physical Attack Recovery Procedures provides a detailed guide to taking the right steps ahead of time, and equipping your facility and employees with the training, knowledge, and tools they need and may save lives. The book contains: A one-of-a-kind action plan describing how hackers attack building equipment, the extent of damage possible, and how to respond when a cyber-physical attack occurs. Detailed descriptions of cyber-physical attacks directed against SCADA systems or building controls, as well as cyber booby traps and cyber drone attacks. Invaluable appendices, including: Emergency Procedures, Team Staffing and Tasking, Alternate Site Procedures, a Documentation List, Software and Hardware Inventories, Vendor Contact Lists, External Support Agreements, and much more. Author Biography Luis Ayala worked over 25 years for the Department of Defense with the past 11 years at the Defense Intelligence Agency. Prior to his appointment as a Defense Intelligence Senior Leader in 2008, he held several leadership positions at the Branch and Division levels. His tenure culminated with the position as Senior Technical Expert (facilities/construction). Mr. Ayala earned his Bachelor of Architecture degree from Pratt Institute and he received his Master of Science and Technology Intelligence from the National Intelligence University. NIU is the Intelligence Communitys sole accredited, federal degree granting institution. His Masters thesis titled "Cybersecure Facilities for the Intelligence Community" is classified. Mr. Ayala was awarded the DIA Civilian Expeditionary Medal and the Civilian Combat Support Medal. Table of Contents Chapter 1: Cyber-Physical Attack Recovery Procedures.- Chapter 2: Threats and Attack Detection.- Chapter 3: Prevent Hackers from Destroying a Boiler.- Chapter 4: Prevent Hackers from Destroying a Pressure Vessel.- Chapter 5: Prevent Hackers from Destroying Chillers.- Chapter 6: Prevent Hackers from Destroying a Gas Fuel Train.- Chapter 7: Prevent Hackers from Destroying a Cooling Tower.- Chapter 8: Preventing Hackers from Destroying a Backup Generator.- Chapter 9: Prevent Hackers from Destroying Switchgear.- Chapter 10: Eight Steps to Defend Building Control Systems.- Chapter 11: Block Hacker Surveillance of your Buildings.- Chapter 12: Cyber-Physical Attack Recovery Procedures Template. Long Description This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time even from the other side of the planet. Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably won t suspect it was a hacker until you see a pattern. The building control system (BCS) will act "squirrelly" and you will know it really is a cyber-physical attack. Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your employees and the local community. "Cyber-Physical Attack Recovery Procedures" provides a detailed guide to taking the right steps ahead of time, and equipping your facility and employees with the training, knowledge, and tools they need and may save lives. The book contains: A one-of-a-kind action plan describing how hackers attack building equipment, the extent of damage possible, and how to respond when a cyber-physical attack occurs.Detailed descriptions of cyber-physical attacks directed against SCADA systems or building controls, as well as cyber booby traps Invaluable appendices, including: Emergency Procedures, Team Staffing and Tasking, Alternate Site Procedures, a Documentation List, Software and Hardware Inventories, Vendor Contact Lists, External Support Agreements, and much more. What you ll learn Possible ways hackers can cause building equipment to fail. How to quickly assess the threat to his facilities in real time, how to stop a cyber-physical attack. How to restore equipment operation without doing any more damage. Who This Book Is For Architects, Engineers, Building Managers, Students, Researchers and Consultants interested in cybersecurity-attacks against facilities in the real world. Also for IT professionals getting involved in cybersecurity responsibilities. " Feature The book is a one-of-a-kind action plan describing how hackers attack building equipment, the extent of damage possible, and how to respond when a cyber-physical attack occurs. Other books cyber-incidents where information is stolen, but very few address cyber-physical attacks directed against SCADA systems or building controls. This book introduces concepts such as cyber booby traps and cyber drone attacks. Details ISBN1484220641 Author Luis Ayala Year 2016 ISBN-10 1484220641 ISBN-13 9781484220641 Format Paperback Short Title CYBER-PHYSICAL ATTACK RECOVERY Language English Media Book Pages 159 Imprint APress Subtitle A Step-by-Step Preparation and Response Guide Place of Publication Berkley Country of Publication United States Publication Date 2016-06-08 Edition 1st Illustrations 2 Illustrations, color; 1 Illustrations, black and white; XX, 159 p. 3 illus., 2 illus. in color. AU Release Date 2016-06-08 NZ Release Date 2016-06-08 US Release Date 2016-06-08 UK Release Date 2016-06-08 Publisher APress Edition Description 1st ed. DEWEY 005.82 Audience Professional & Vocational We've got this At The Nile, if you're looking for it, we've got it. With fast shipping, low prices, friendly service and well over a million items - you're bound to find what you want, at a price you'll love! TheNile_Item_ID:137941503;

Price: 228.98 AUD

Location: Melbourne

End Time: 2024-12-05T02:20:24.000Z

Shipping Cost: 0 AUD

Product Images

Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Respon

Item Specifics

Restocking fee: No

Return shipping will be paid by: Buyer

Returns Accepted: Returns Accepted

Item must be returned within: 30 Days

ISBN-13: 9781484220641

Book Title: Cyber-Physical Attack Recovery Procedures

Number of Pages: 159 Pages

Language: English

Publication Name: Cyber-Physical Attack Recovery Procedures: a Step-By-Step Preparation and Response Guide

Publisher: Apress

Publication Year: 2016

Subject: Computer Science

Item Height: 254 mm

Item Weight: 3496 g

Type: Textbook

Author: Luis Ayala

Item Width: 178 mm

Format: Paperback

Recommended

Cyber-Physical Attacks: A Growing Invisible Threat, Loukas PhD  Imperial College
Cyber-Physical Attacks: A Growing Invisible Threat, Loukas PhD Imperial College

$24.00

View Details
Cyber-physical Attacks : A Growing Invisible Threat, Paperback by Loukas , Ge...
Cyber-physical Attacks : A Growing Invisible Threat, Paperback by Loukas , Ge...

$49.49

View Details
Cyber-physical Attack Recovery Procedures : A Step-by-step Preparation and Re...
Cyber-physical Attack Recovery Procedures : A Step-by-step Preparation and Re...

$85.85

View Details
Cyber-Physical Attacks: A Growing Invisible Threat by George Loukas: Used
Cyber-Physical Attacks: A Growing Invisible Threat by George Loukas: Used

$28.64

View Details
Cyber-Physical Attacks : How They Work and How to Protect Against Them by George
Cyber-Physical Attacks : How They Work and How to Protect Against Them by George

$25.00

View Details
Cyber-physical Attacks : A Growing Invisible Threat, Paperback by Loukas , Ge...
Cyber-physical Attacks : A Growing Invisible Threat, Paperback by Loukas , Ge...

$38.33

View Details
Cyber-Physical Attack Recovery Procedures: A Step-By-Step Preparation and
Cyber-Physical Attack Recovery Procedures: A Step-By-Step Preparation and

$88.90

View Details
Tine Munk - Rise of Politically Motivated Cyber Attacks   Actors Att - S9000z
Tine Munk - Rise of Politically Motivated Cyber Attacks Actors Att - S9000z

$68.72

View Details
Cyber-Physical Attacks: A Growing Invisible Threat, Loukas 9780128012901 New.=
Cyber-Physical Attacks: A Growing Invisible Threat, Loukas 9780128012901 New.=

$56.79

View Details
Cyber-physical Attacks : A Growing Invisible Threat, Paperback by Loukas , Ge...
Cyber-physical Attacks : A Growing Invisible Threat, Paperback by Loukas , Ge...

$56.30

View Details