Cyber-Physical Attack Recovery Procedures (eBook)

A Step-by-Step Preparation and Response Guide

(Autor)

eBook Download: PDF
2016 | 1. Auflage
XX, 159 Seiten
Apress (Verlag)
978-1-4842-2065-8 (ISBN)

Lese- und Medienproben

Cyber-Physical Attack Recovery Procedures -  Luis Ayala
Systemvoraussetzungen
66,99 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time-even from the other side of the planet.

Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably won't suspect it was a hacker-until you see a pattern. The building control system (BCS) will act 'squirrelly' and you will know-it really is a cyber-physical attack.

Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your employees and the local community. Cyber-Physical Attack Recovery Procedures provides a detailed guide to taking the right steps ahead of time, and equipping your facility and employees with the training, knowledge, and tools they need and may save lives.

The book contains:

  • A one-of-a-kind action plan describing how hackers attack building equipment, the extent of damage possible, and how to respond when a cyber-physical attack occurs.
  • Detailed descriptions of cyber-physical attacks directed against SCADA systems or building controls, as well as cyber booby traps 
  • Invaluable appendices, including: Emergency Procedures, Team Staffing and Tasking, Alternate Site Procedures, a Documentation List, Software and Hardware Inventories, Vendor Contact Lists, External Support Agreements, and much more.

What you'll learn

  • Possible ways hackers can cause building equipment to fail.
  • How to quickly assess the threat to his facilities in real time, how to stop a cyber-physical attack.
  • How to restore equipment operation without doing any more damage.

Who This Book Is For

Architects, Engineers, Building Managers, Students, Researchers and Consultants interested in cybersecurity-attacks against facilities in the real world. Also for IT professionals getting involved in cybersecurity responsibilities.



Luis Ayala worked over 25 years for the Department of Defense with the past 11 years at the Defense Intelligence Agency. Prior to his appointment as a Defense Intelligence Senior Leader in 2008, he held several leadership positions at the Branch and Division levels.

His tenure culminated with the position as Senior Technical Expert (facilities/construction). Mr. Ayala earned his Bachelor of Architecture degree from Pratt Institute and he received his Master of Science and Technology Intelligence from the National Intelligence University. NIU is the Intelligence Community's sole accredited, federal degree granting institution. His Master's thesis titled 'Cybersecure Facilities for the Intelligence Community' is classified. Mr. Ayala was awarded the DIA Civilian Expeditionary Medal and the Civilian Combat Support Medal.


This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time-even from the other side of the planet.Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably won t suspect it was a hacker until you see a pattern. The building control system (BCS) will act "e;squirrelly"e; and you will know it really is a cyber-physical attack.Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your employees and the local community. Cyber-Physical Attack Recovery Procedures provides a detailed guide to taking the right steps ahead of time, and equipping your facility and employees with the training, knowledge, and tools they need and may save lives. The book contains:A one-of-a-kind action plan describing how hackers attack building equipment, the extent of damage possible, and how to respond when a cyber-physical attack occurs.Detailed descriptions of cyber-physical attacks directed against SCADA systems or building controls, as well as cyber booby traps Invaluable appendices, including: Emergency Procedures, Team Staffing and Tasking, Alternate Site Procedures, a Documentation List, Software and Hardware Inventories, Vendor Contact Lists, External Support Agreements, and much more. What you ll learnPossible ways hackers cancause building equipment to fail.How to quickly assess the threat to his facilities in real time, how to stop a cyber-physical attack.How to restore equipment operation without doing any more damage.Who This Book Is ForArchitects, Engineers, Building Managers, Students, Researchers and Consultants interested in cybersecurity-attacks against facilities in the real world. Also for IT professionals getting involved in cybersecurity responsibilities.

Luis Ayala worked over 25 years for the Department of Defense with the past 11 years at the Defense Intelligence Agency. Prior to his appointment as a Defense Intelligence Senior Leader in 2008, he held several leadership positions at the Branch and Division levels. His tenure culminated with the position as Senior Technical Expert (facilities/construction). Mr. Ayala earned his Bachelor of Architecture degree from Pratt Institute and he received his Master of Science and Technology Intelligence from the National Intelligence University. NIU is the Intelligence Community’s sole accredited, federal degree granting institution. His Master’s thesis titled “Cybersecure Facilities for the Intelligence Community” is classified. Mr. Ayala was awarded the DIA Civilian Expeditionary Medal and the Civilian Combat Support Medal.

Chapter 1: Cyber-Physical Attack Recovery Procedures.- Chapter 2: Threats and Attack Detection.- Chapter 3: Prevent Hackers from Destroying a Boiler.- Chapter 4: Prevent Hackers from Destroying a Pressure Vessel.- Chapter 5: Prevent Hackers from Destroying Chillers.- Chapter 6: Prevent Hackers from Destroying a Gas Fuel Train.- Chapter 7: Prevent Hackers from Destroying a Cooling Tower.- Chapter 8: Preventing Hackers from Destroying a Backup Generator.- Chapter 9: Prevent Hackers from Destroying Switchgear.- Chapter 10: Eight Steps to Defend Building Control Systems.- Chapter 11: Block Hacker Surveillance of your Buildings.- Chapter 12: Cyber-Physical Attack Recovery Procedures Template.- 

Erscheint lt. Verlag 8.6.2016
Zusatzinfo XX, 159 p. 3 illus., 2 illus. in color.
Verlagsort Berkeley
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Informatik Weitere Themen Hardware
Schlagworte Building control • Cyber Attack detection • Cyber Attack vectors • Cyber Booby-Trap • Cyber drone attack • Cyber-Physical Attack • cybersecurity • Industrial Control Systems • SCADA systems
ISBN-10 1-4842-2065-X / 148422065X
ISBN-13 978-1-4842-2065-8 / 9781484220658
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 7,9 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
79,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90