Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide

Buy

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time―even from the other side of the planet.

Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably won’t suspect it was a hacker―until you see a pattern. The building control system (BCS) will act "squirrelly" and you will know―it really is a cyber-physical attack.

Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your employees and the local community. Cyber-Physical Attack Recovery Procedures provides a detailed guide to taking the right steps ahead of time, and equipping your facility and employees with the training, knowledge, and tools they need and may save lives.

The book contains:

  • A one-of-a-kind action plan describing how hackers attack building equipment, the extent of damage possible, and how to respond when a cyber-physical attack occurs.
  • Detailed descriptions of cyber-physical attacks directed against SCADA systems or building controls, as well as cyber booby traps 
  • Invaluable appendices, including: Emergency Procedures, Team Staffing and Tasking, Alternate Site Procedures, a Documentation List, Software and Hardware Inventories, Vendor Contact Lists, External Support Agreements, and much more.

What you’ll learn

  • Possible ways hackers can cause building equipment to fail.
  • How to quickly assess the threat to his facilities in real time, how to stop a cyber-physical attack.
  • How to restore equipment operation without doing any more damage.

Who This Book Is For

Architects, Engineers, Building Managers, Students, Researchers and Consultants interested in cybersecurity-attacks against facilities in the real world. Also for IT professionals getting involved in cybersecurity responsibilities.

(HTML tags aren't allowed.)

Spatial Decision Support Systems: Principles and Practices
Spatial Decision Support Systems: Principles and Practices

Geographic information systems (GIS) have been under continuous development for several decades. By now, they are both well known and widely used, and have become integral elements of information technology applications in a wide variety of domains. In its simplest form, GIS software enables users to address a variety of questions...

Finite Antenna Arrays and FSS
Finite Antenna Arrays and FSS

A periodic surface is an assembly of identical elements arranged in a one or two-dimensional array. Such surfaces have various effects on incident electromagnetic waves. Their applications range from antennas to stealth aircraft.This book discusses finite antenna arrays and how to minimize the radar cross section of these arrays.

...

Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions

The Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions addresses a broad range of electronic devices and software for crime prevention and investigation. This defining body of research covers a wide spectrum of topics useful to a broad cross-sectional and multi-disciplinary...


Misadventures in Health Care: Inside Stories (Human Error and Safety)
Misadventures in Health Care: Inside Stories (Human Error and Safety)

Misadventures in Health Care: Inside Stories presents an alternative approach to attributing the cause of medical error solely to the health care provider. That alternative, the systems approach, pursues why an incident occurs in terms of factors in the context of care that affect the care provider to induce an error. The basis for...

Designing Data-Intensive Web Applications
Designing Data-Intensive Web Applications

The most prominent Web applications in use today are data-intensive. Scores of database management systems across the Internet access and maintain large amounts of structured data for e-commerce, on-line trading, banking, digital libraries, and other high-volume sites.

Developing and maintaining these data-intensive applications is...

IBM Data Warehousing: With IBM Business Intelligence Tools
IBM Data Warehousing: With IBM Business Intelligence Tools
Architects, project planners, and sponsors are always dealing with multiple technologies, conflicting techniques, and competing business agendas. This combination of issues gives rise to many challenges facing business intelligence (BI) and data warehouse (DW) initiatives. The question you need to ask yourself is this: “Do I have the...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy