Cyber-Security Glossary of Building Hacks and Cyber-Attacks

Bog
  • Format
  • Bog, paperback
  • Engelsk
  • 132 sider

Beskrivelse

Buildings today are automated because the systems are complicated so we depend on the Building Controls System (BCS) to operate the equipment. We also depend on a Computerized Maintenance Management System (CMMS) to keep a record of what was repaired and to schedule required maintenance. SCADA, BCS and CMMS can all be hacked. Maintenance staff may think the BCS is not connected to the Internet, but as a Registered Architect I have yet to see a building that is not connected to the Internet. If your building is connected to the Internet, I assure you that your BCS has already been hacked and mapped, the data in the CMMS has been exfiltrated, and backdoors have been installed. And, if your BCS is also connected to your Enterprise network, hackers may have gotten into that thru the BCS. If hackers get into your BCS, they own you. Discussion of building hacks and cyber-attacks is clouded by a lack of standard definitions and a general misunderstanding about how bad actors can actually employ cyber technology as a weapon in the real world. Architects, engineers and facility engineers need to know how to defend their buildings against cyber-attack by learning more about the cyber "attack surface" which is the sum of all the "attack vectors." The Cyber-Security Glossary of Building Hacks and Cyber-Attacks was developed specifically to introduce non-IT Managers to the vulnerability of industrial control systems (and SCADA systems) to cyber-attack. The book includes definitions of technical terms related to equipment controls common to industry, utilities and buildings and much of the terminology applies to cyber-attacks in general. I define many types of cyber-attacks including: Cyber Drones; Dictionary attack; Cinderella attack; Time Bomb attack; Fork Bomb attack; Logic Bomb attack; Bluesnarfing; Smurf attack; Vampire Tap; Water Holing; Pass the Hash attack; Tiny Fragment attack; Protocol Fuzzing attack; Replay attack; Amplification attack; Man in the Middle attack; and many more. Also available on Kindle This material was printed by 4th Watch Books. 4th Watch books use high-quality paper and are tightly bound. For more information, visit: cybah.webplus.net

Læs hele beskrivelsen
Detaljer
  • SprogEngelsk
  • Sidetal132
  • Udgivelsesdato22-09-2015
  • ISBN139781517484873
  • Forlag Createspace
  • FormatPaperback
  • Udgave0
Størrelse og vægt
  • Vægt380 g
  • Dybde0,8 cm
  • coffee cup img
    10 cm
    book img
    21,5 cm
    27,9 cm

    Findes i disse kategorier...

    Se andre, der handler om...

    Velkommen til Saxo – din danske boghandel

    Hos os kan du handle som gæst, Saxo-bruger eller Saxo-medlem – du bestemmer selv. Skulle du få brug for hjælp, sidder vores kundeservice-team klar ved både telefonerne og tasterne.

    Om medlemspriser hos Saxo

    For at købe bøger til medlemspris skal du være medlem af Saxo Premium, Saxo Shopping eller Saxo Ung. De første 7 dage er gratis for nye medlemmer. Medlemskabet fornyes automatisk og kan altid opsiges. Læs mere om fordelene ved vores forskellige medlemskaber her.

    Machine Name: SAXO080