Cyber-physical attack recovery procedures : a step-by-step preparation and response guide

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and a...

Full description

Saved in:
Bibliographic Details
Main Author: Ayala, Luis, (Author)
Format: eBook
Language: English
Published: [Berkeley, CA] : Apress, 2016.
Subjects:
ISBN: 9781484220658
9781484220641
Physical Description: 1 online zdroj (xx, 159 stran) : ilustrace

Cover

Table of contents

LEADER 04537cam a2200565 i 4500
001 103133
003 CZ-ZlUTB
005 20240914114109.0
006 m o d
007 cr cnu|||unuuu
008 160613s2016 caua fof 001 0 eng d
999 |c 103133  |d 103133 
020 |a 9781484220658  |q (electronic bk.) 
020 |z 9781484220641  |q (print) 
024 7 |a 10.1007/978-1-4842-2065-8  |2 doi 
035 |a (OCoLC)951622345  |z (OCoLC)951977483  |z (OCoLC)961863316  |z (OCoLC)964878327  |z (OCoLC)1005755014  |z (OCoLC)1012091294  |z (OCoLC)1026442181  |z (OCoLC)1048180082  |z (OCoLC)1066581680  |z (OCoLC)1066687830  |z (OCoLC)1086467628  |z (OCoLC)1103274587 
040 |a N$T  |b eng  |e rda  |c N$T  |d YDXCP  |d IDEBK  |d GW5XE  |d EBLCP  |d N$T  |d AZU  |d COO  |d VT2  |d DEBSZ  |d K6U  |d MERUC  |d IDB  |d UAB  |d IAD  |d JBG  |d ICW  |d ILO  |d ICN  |d LIV  |d OCLCQ  |d ESU  |d OCLCQ  |d IOG  |d OCLCO  |d U3W  |d OCLCA  |d VVB  |d REB  |d OCLCF  |d WYU  |d UKMGB  |d AUD  |d LEAUB  |d MERER  |d OCLCQ  |d UKAHL 
072 7 |a 343  |x Trestní právo  |2 Konspekt  |9 16 
080 |a 343.3/.7:004  |2 MRF 
080 |a 004.056.53  |2 MRF 
080 |a (0.034.2:08)   |2 MRF 
080 |a (035)  |2 MRF 
100 1 |a Ayala, Luis,  |e author. 
245 1 0 |a Cyber-physical attack recovery procedures :  |b a step-by-step preparation and response guide /  |c Luis Ayala. 
264 1 |a [Berkeley, CA] :  |b Apress,  |c 2016. 
264 2 |a New York, NY :  |b Distributed to the Book trade worldwide by Springer 
264 4 |c ©2016 
300 |a 1 online zdroj (xx, 159 stran) :  |b ilustrace 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
504 |a Obsahuje bibliografické odkazy a index. 
506 |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty 
520 |a This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time--even from the other side of the planet. Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably won't suspect it was a hacker--until you see a pattern. The building control system (BCS) will act "squirrelly" and you will know--it really is a cyber-physical attack. Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your employees and the local community. Cyber-Physical Attack Recovery Procedures provides a detailed guide to taking the right steps ahead of time, and equipping your facility and employees with the training, knowledge, and tools they need and may save lives. The book contains: A one-of-a-kind action plan describing how hackers attack building equipment, the extent of damage possible, and how to respond when a cyber-physical attack occurs. Detailed descriptions of cyber-physical attacks directed against SCADA systems or building controls, as well as cyber booby traps and cyber drone attacks. Invaluable appendices, including: Emergency Procedures, Team Staffing and Tasking, Alternate Site Procedures, a Documentation List, Software and Hardware Inventories, Vendor Contact Lists, External Support Agreements, and much more.- Resumé vydavatel 
590 |a eBooks on EBSCOhost  |b All EBSCO eBooks 
650 0 7 |a kybernetická bezpečnost  |7 ph716242  |2 czenas 
650 0 7 |a počítačová kriminalita  |7 ph124505  |2 czenas 
650 0 7 |a hackování  |7 ph138199  |2 czenas 
650 0 9 |a cyber security  |2 eczenas 
650 0 9 |a computer crimes  |2 eczenas 
650 0 9 |a computer hacking  |2 eczenas 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
655 7 |a příručky  |7 fd133209  |2 czenas 
655 9 |a electronic books  |2 eczenas 
655 9 |a handbooks and manuals  |2 eczenas 
776 0 8 |i Print version:  |a Ayala, Luis.  |t Cyber-Physical Attack Recovery Procedures : A Step-by-Step Preparation and Response Guide.  |d Berkeley, CA : Apress, ©2016  |z 9781484220641 
856 4 0 |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1228800&authtype=ip,shib&custid=s3936755  |y Plný text 
942 |2 udc 
992 |c EBOOK-TN  |c EBSCO 
993 |x NEPOSILAT  |y EIZ