<p><i>Cyber-Physical Attacks:Β A Growing Invisible Threat</i>Β presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a buildingβs lights, make a car veer off the road,Β or a drone land in enemy hands. In essence, it details the ways cyber-physical attack
Cyber-physical attacks: a growing invisible threat
β Scribed by Loukas, George
- Publisher
- Butterworth-Heinemann is an imprint of Elsevier
- Year
- 2015
- Tongue
- English
- Leaves
- 261
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
"Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the Read more...
β¦ Table of Contents
Front Cover
Cyber-Physical Attacks
Copyright Page
Dedication
Contents
1 A Cyber-Physical World
Basic Concepts and Definitions of a Cyber-Physical World
Transducers
Controllers
Embedded Systems
Cyber-Physical Systems
The Internet of Things
Defining Cyber-Physical Attacks
Who Should Read This Book
Outline
Chapter 1: A Cyber-Physical World
Chapter 2: A History of Cyber-Physical Security Incidents
Chapter 3: Cyber-Physical Attacks on Implants and Vehicles
Chapter 4: Cyber-Physical Attacks on Industrial Control Systems
Chapter 5: Cyber-Physical Attack Steps. Chapter 6: Protection Mechanisms and Secure Design PrinciplesChapter 7: Physical-Cyber Attacks
Summary
Follow-Up Questions and Exercises
2 A History of Cyber-Physical Security Incidents
Reported Incidents by Sector Affected
Energy
Water
Health
Transportation
Defense
A Discussion on the Cyber-Physical Security Incident Reports
Motivations
Second Order Cyber-Physical Dependencies
The Impact of Cyber-Physical Attacks
Summary
Follow-Up Questions and Exercises
3 Cyber-Physical Attacks on Implants and Vehicles
Implantable Medical Devices
Insulin Pumps. Implantable Cardioverter DefibrillatorsVehicles
Unmanned Aerial Vehicles
Automobiles
Summary
Follow-Up Questions and Exercises
4 Cyber-Physical Attacks on Industrial Control Systems
SCADA
SCADA Network Vulnerabilities
Factors Affecting SCADA Security
Strict Real-Time Requirements
Continuous Availability
Misguided Security Perceptions
Commercial-off-the-Shelf Hardware and Software
Interconnectivity
Internet Accessibility
Stuxnet: A Milestone in Industrial Control System Security
The Background
The Payload and the Attack
The Delivery
The Impact and the Aftermath. The Electric GridPower Generators
The Smart Grid
Summary
Follow-Up Questions and Exercises
5 Cyber-Physical Attack Steps
Preliminary Research and Reconnaissance
Internet Research
Social Engineering
Watering Hole
Vulnerability Discovery
Intrusion
Full-Body Scanner
Intelligent Traffic Lights
Home Automation
Attack Delivery
Black Hole/Gray Hole
Code Injection
Command Injection
Communication Jamming
Denial of Service
False Data Injection: Communication-Based
False Data Injection: Database-Based
False Data Injection: Sensor-Based
Firmware Modification
Fuzzing
GPS Jamming. GPS Spoofing/MeaconingMalware Infection
Man-in-the-Middle
Network Isolation
Packet Sniffing
Password Cracking
Relay Attack
Replay Attack
Rogue Node
Sleep Deprivation
Supply Chain Attack
Antiforensics
Summary
Follow-Up Questions and Exercises
6 Protection Mechanisms and Secure Design Principles
Protection Mechanisms
Authentication
Access Control
Firewall
Intrusion Detection
Antimalware
Application Whitelisting
Flow Whitelisting
Cryptography
Integrity Verification
Survivability
Secure Design Principles
Economy of Mechanism
Defense-in-Depth
Least-Privilege.
π SIMILAR VOLUMES
Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nations most highly respected
Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected
<span>Nowadays, the Internet has become all pervasive in the daily life around the world, transforming the old telephone set into a small multipurpose computer. Consequently, human life has radically changed. Our dependence on computer networks became undeniable and together with it, harmful program
<P>Threat intelligence is a surprisingly complex topic that goes far beyond the obvious technical challenges of collecting, modelling and sharing technical indicators. Most books in this area focus mainly on technical measures to harden a system based on threat intel data and limit their scope to si