Skip to main content

Createspace Independent Publishing Platform

Cyber-Security Glossary of Building Hacks and Cyber-Attacks

No reviews yet
Product Code: 9781517484873
ISBN13: 9781517484873
Condition: New
$18.83

Cyber-Security Glossary of Building Hacks and Cyber-Attacks

$18.83
 
Buildings today are automated because the systems are complicated so we depend on the Building Controls System (BCS) to operate the equipment. We also depend on a Computerized Maintenance Management System (CMMS) to keep a record of what was repaired and to schedule required maintenance.

SCADA, BCS and CMMS can all be hacked. Maintenance staff may think the BCS is not connected to the Internet, but as a Registered Architect I have yet to see a building that is not connected to the Internet. If your building is connected to the Internet, I assure you that your BCS has already been hacked and mapped, the data in the CMMS has been exfiltrated, and backdoors have been installed.

And, if your BCS is also connected to your Enterprise network, hackers may have gotten into that thru the BCS.

If hackers get into your BCS, they own you.

Discussion of building hacks and cyber-attacks is clouded by a lack of standard definitions and a general misunderstanding about how bad actors can actually employ cyber technology as a weapon in the real world. Architects, engineers and facility engineers need to know how to defend their buildings against cyber-attack by learning more about the cyber "attack surface" which is the sum of all the "attack vectors". The Cyber-Security Glossary of Building Hacks and Cyber-Attacks was developed specifically to introduce non-IT Managers to the vulnerability of industrial control systems (and SCADA systems) to cyber-attack.

The book includes definitions of technical terms related to equipment controls common to industry, utilities and buildings and much of the terminology applies to cyber-attacks in general. I define many types of cyber-attacks including: Cyber Drones; Dictionary attack; Cinderella attack; Time Bomb attack; Fork Bomb attack; Logic Bomb attack; Bluesnarfing; Smurf attack; Vampire Tap; Water Holing; Pass the Hash attack; Tiny Fragment attack; Protocol Fuzzing attack; Replay attack; Amplification attack; Man in the Middle attack; and many more. Also available on Kindle This material was printed by 4th Watch Books. 4th Watch books use high-quality paper and are tightly bound. For more information, visit: cybah.webplus.net


Author: Luis Ayala
Publisher: Createspace Independent Publishing Platform
Publication Date: Sep 22, 2015
Number of Pages: 158 pages
Binding: Paperback or Softback
ISBN-10: 1517484871
ISBN-13: 9781517484873
 

Customer Reviews

This product hasn't received any reviews yet. Be the first to review this product!

Faster Shipping

Delivery in 3-8 days

Easy Returns

14 days returns

Discount upto 30%

Monthly discount on books

Outstanding Customer Service

Support 24 hours a day