Cyber-Physical Attack Recovery Procedures

A Step-by-Step Preparation and Response Guide



Bookstore > Books > Cyber-Physical Attack Recovery Procedures

Price$44.99 - $52.77
Rating
AuthorLuis Ayala
PublisherApress
Published2016
Pages250
LanguageEnglish
FormatPaper book / ebook (PDF)
ISBN-101484220641
ISBN-139781484220641
EBook Hardcover Paperback

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time - even from the other side of the planet.

Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably won't suspect it was a hacker - until you see a pattern. The building control system (BCS) will act "squirrelly" and you will know - it really is a cyber-physical attack.

Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your employees and the local community. Cyber-Physical Attack Recovery Procedures provides a detailed guide to taking the right steps ahead of time, and equipping your facility and employees with the training, knowledge, and tools they need and may save lives.




4 5 2

Similar Books


Introduction to Embedded Systems, 2nd Edition

Introduction to Embedded Systems, 2nd Edition

by Edward Ashford Lee, Sanjit Arunkumar Seshia

An introduction to the engineering principles of embedded systems, with a focus on modeling, design, and analysis of cyber-physical systems.The most visible use of computers and software is processing information for human consumption. The vast majority of computers in use, however, are much less visible. They run the engine, brakes, seat...

Price:  $18.66  |  Free ebook  |  Publisher:  Self-publishing  |  Release:  2017

Machine Learning for Cyber Physical Systems

Machine Learning for Cyber Physical Systems

by Jurgen Beyerer, Alexander Maier, Oliver Niggemann

This open proceedings presents new approaches to Machine Learning for Cyber Physical Systems, experiences and visions. It contains selected papers from the fifth international Conference ML4CPS - Machine Learning for Cyber Physical Systems, which was held in Berlin, March 12-13, 2020. Cyber Physical Systems are characterized by their abil...

Price:  $6.91  |  Free ebook  |  Publisher:  Springer  |  Release:  2021

Python for Cybersecurity

Python for Cybersecurity

by Howard E. Poston

Python For Cybersecurity: Using Python for Cyber Offense and Defense delivers an intuitive and hands-on explanation of using Python for cybersecurity. It relies on the MITRE ATT&CK framework to structure its exploration of cyberattack techniques, attack defenses, and the key cybersecurity challenges facing network administrators and o...

Price:  $14.65  |  Publisher:  Wiley  |  Release:  2022

Practical Oracle Database Appliance

Practical Oracle Database Appliance

by Bobby Curtis, Fuad Arshad, Erik Benner, Maris Elsins, Matt Gallagher, Pete Sharman, Yury Velikanov

Practical Oracle Database Appliance is a hands-on book taking you through the components and implementation of the Oracle Database Appliance. Learn about architecture, installation, configuration, and reconfiguration. Install and configure the Oracle Database Appliance with confidence. Make the right choices between the various configurat...

Price:  $49.99  |  Publisher:  Apress  |  Release:  2014

Unifying Theories of Programming and Formal Engineering Methods

Unifying Theories of Programming and Formal Engineering Methods

by Zhiming Liu, Jim Woodcock, Huibiao Zhu

This book presents 5 tutorial lectures by leading researchers given at the ICTAC 2013 Software Engineering School on Unifying Theories of Programming and Formal Engineering Methods, held in Shanghai, China in August 2013.The lectures are aimed at postgraduate students, researchers, academics, and industrial engineers. They cover topics su...

Price:  $59.64  |  Publisher:  Springer  |  Release:  2013

Cyber Threat!

Cyber Threat!

by MacDonnell Ulsch

Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book desc...

Price:  $17.90  |  Publisher:  Wiley  |  Release:  2014

Go H*ck Yourself

Go H*ck Yourself

by Bryson Payne

Go H*ck Yourself is an eye-opening, hands-on introduction to the world of hacking, from an award-winning cybersecurity coach. As you perform common attacks against yourself, you'll be shocked by how easy they are to carry out - and realize just how vulnerable most people really are. You'll be guided through setting up a virtual ...

Price:  $20.99  |  Publisher:  No Starch Press  |  Release:  2022

Enterprise Cybersecurity

Enterprise Cybersecurity

by Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to architect, de...

Price:  $49.11  |  Publisher:  Apress  |  Release:  2015