Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide

Buy

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time―even from the other side of the planet.

Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably won’t suspect it was a hacker―until you see a pattern. The building control system (BCS) will act "squirrelly" and you will know―it really is a cyber-physical attack.

Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your employees and the local community. Cyber-Physical Attack Recovery Procedures provides a detailed guide to taking the right steps ahead of time, and equipping your facility and employees with the training, knowledge, and tools they need and may save lives.

The book contains:

  • A one-of-a-kind action plan describing how hackers attack building equipment, the extent of damage possible, and how to respond when a cyber-physical attack occurs.
  • Detailed descriptions of cyber-physical attacks directed against SCADA systems or building controls, as well as cyber booby traps 
  • Invaluable appendices, including: Emergency Procedures, Team Staffing and Tasking, Alternate Site Procedures, a Documentation List, Software and Hardware Inventories, Vendor Contact Lists, External Support Agreements, and much more.

What you’ll learn

  • Possible ways hackers can cause building equipment to fail.
  • How to quickly assess the threat to his facilities in real time, how to stop a cyber-physical attack.
  • How to restore equipment operation without doing any more damage.

Who This Book Is For

Architects, Engineers, Building Managers, Students, Researchers and Consultants interested in cybersecurity-attacks against facilities in the real world. Also for IT professionals getting involved in cybersecurity responsibilities.

(HTML tags aren't allowed.)

Algebra und Diskrete Mathematik 1: Grundbegriffe der Mathematik, Algebraische Strukturen 1, Lineare Algebra und Analytische Geometrie, Numerische Algebra
Algebra und Diskrete Mathematik 1: Grundbegriffe der Mathematik, Algebraische Strukturen 1, Lineare Algebra und Analytische Geometrie, Numerische Algebra
Algebra und Diskrete Mathematik gehören zu den wichtigsten mathematischen Grundlagen der Informatik. Dieses zweibändige Lehrbuch liegt jetzt in korrigierter zweiter Auflage vor und führt umfassend und lebendig in den Themenkomplex ein. Dabei ermöglichen ein klares Herausarbeiten von Lösungsalgorithmen, viele Beispiele,...
Excel Dashboards and Reports
Excel Dashboards and Reports

The go to resource for how to use Excel dashboards and reports to better conceptualize data

Many Excel books do an adequate job of discussing the individual functions and tools that can be used to create an “Excel Report.” What they don’t offer is the most effective ways to present and report data. Offering...

The Fearful Rise of Markets: Global Bubbles, Synchronized Meltdowns, and How To Prevent Them in the Future
The Fearful Rise of Markets: Global Bubbles, Synchronized Meltdowns, and How To Prevent Them in the Future

“This enjoyable, fast-moving book is concise, relevant, and perceptive. My bottom line is a simple one: This book should be read by all those interested in the way markets operate, be they investors, analysts, or policy makers.”

From the Foreword by Mohamed A....


New Perspectives on HTML, XHTML, and XML (New Perspectives)
New Perspectives on HTML, XHTML, and XML (New Perspectives)

The New Perspectives Series’ critical-thinking, problem-solving approach is the ideal way to prepare students to transcend point-and-click skills and take advantage of all that the World Wide Web has to offer.

Our goal in developing the New Perspectives Series was to create books that give students the software concepts...

Computation Engineering: Applied Automata Theory and Logic
Computation Engineering: Applied Automata Theory and Logic

The computer hardware and software industry is committed to using formal methods. As a result, it is crucial that students who take automata theory and logic courses retain what they have learned and understand how to use their knowledge. Yet many textbooks typically emphasize automata theory only, not logic, thus losing a valuable opportunity...

Encyclopedia of Civil War Shipwrecks
Encyclopedia of Civil War Shipwrecks
On the evening of February 2, 1864, Confederate Commander John Taylor Wood led 250 sailors in two launches and twelve boats to capture the USS Underwriter, a side-wheel steam gunboat anchored on the Neuse River near New Bern, North Carolina. During the ensuing fifteen-minute battle, nine Union crewmen lost their lives, twenty were wounded,...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy