Cyber-Physical Attack Recovery Procedures

A Step-by-Step Preparation and Response Guide

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Cyber-Physical Attack Recovery Procedures by Luis Ayala, Apress
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Luis Ayala ISBN: 9781484220658
Publisher: Apress Publication: June 8, 2016
Imprint: Apress Language: English
Author: Luis Ayala
ISBN: 9781484220658
Publisher: Apress
Publication: June 8, 2016
Imprint: Apress
Language: English

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time—even from the other side of the planet.

Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably won’t suspect it was a hacker—until you see a pattern. The building control system (BCS) will act "squirrelly" and you will know—it really is a cyber-physical attack.

Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your employees and the local community. Cyber-Physical Attack Recovery Procedures provides a detailed guide to taking the right steps ahead of time, and equipping your facility and employees with the training, knowledge, and tools they need and may save lives.

The book contains:

  • A one-of-a-kind action plan describing how hackers attack building equipment, the extent of damage possible, and how to respond when a cyber-physical attack occurs.
  • Detailed descriptions of cyber-physical attacks directed against SCADA systems or building controls, as well as cyber booby traps 
  • Invaluable appendices, including: Emergency Procedures, Team Staffing and Tasking, Alternate Site Procedures, a Documentation List, Software and Hardware Inventories, Vendor Contact Lists, External Support Agreements, and much more.

What you’ll learn

  • Possible ways hackers can cause building equipment to fail.

  • How to quickly assess the threat to his facilities in real time, how to stop a cyber-physical attack.

  • How to restore equipment operation without doing any more damage.

Who This Book Is For

Architects, Engineers, Building Managers, Students, Researchers and Consultants interested in cybersecurity-attacks against facilities in the real world. Also for IT professionals getting involved in cybersecurity responsibilities.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time—even from the other side of the planet.

Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably won’t suspect it was a hacker—until you see a pattern. The building control system (BCS) will act "squirrelly" and you will know—it really is a cyber-physical attack.

Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your employees and the local community. Cyber-Physical Attack Recovery Procedures provides a detailed guide to taking the right steps ahead of time, and equipping your facility and employees with the training, knowledge, and tools they need and may save lives.

The book contains:

What you’ll learn

Who This Book Is For

Architects, Engineers, Building Managers, Students, Researchers and Consultants interested in cybersecurity-attacks against facilities in the real world. Also for IT professionals getting involved in cybersecurity responsibilities.

More books from Apress

Cover of the book Practical Artificial Intelligence by Luis Ayala
Cover of the book Java I/O, NIO and NIO.2 by Luis Ayala
Cover of the book Beginning Elastic Stack by Luis Ayala
Cover of the book Advanced Metaprogramming in Classic C++ by Luis Ayala
Cover of the book Offshoring IT by Luis Ayala
Cover of the book The Definitive Guide to SUSE Linux Enterprise Server 12 by Luis Ayala
Cover of the book Pro RESTful APIs by Luis Ayala
Cover of the book Enterprise Information Management in Practice by Luis Ayala
Cover of the book Numerical Python by Luis Ayala
Cover of the book Predictive Analytics with Microsoft Azure Machine Learning 2nd Edition by Luis Ayala
Cover of the book Beginning RPG Maker VX Ace by Luis Ayala
Cover of the book From Techie to Boss by Luis Ayala
Cover of the book Pro HTML5 with Visual Studio 2015 by Luis Ayala
Cover of the book Beginning Windows 8.1 by Luis Ayala
Cover of the book C# Deconstructed by Luis Ayala
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy