Cyber-physical attacks : a growing invisible threat

Enregistré dans:
Détails bibliographiques
Auteur principal: Loukas, George. (Auteur)
Support: E-Book
Langue: Anglais
Publié: Oxford : Butterworth-Heinemann is an imprint of Elsevier, [2015]
Sujets:
Autres localisations: Voir dans le Sudoc
Résumé: Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral outrage that would follow a more overt physical attack. Readers will learn about all aspects of this brave new world of cyber-physical attacks, along with tactics on how to defend against them. The book provides an accessible introduction to the variety of cyber-physical attacks that have already been employed or are likely to be employed in the near future
Accès en ligne: Accès à l'E-book
LEADER 07052cmm a2200889 i 4500
001 ebook-191312193
005 20240112135457.0
007 cr|cuu---auauu
008 160211s2015||||uk ||||g|||d ||||||eng d
020 |a 0128014636 
020 |z 9780128012901 
020 |a 9780128014639 
035 |a 19217567X  |9 sudoc 
035 |a (OCoLC)910102749 
035 |z ocm910446918 
035 |a DEBSZ433954108 
035 |a NZ116092611 
035 |a CHVBK341782726 
035 |a CHBIS010547901 
035 |a DEBSZ451526449 
035 |a DEBSZ453330789 
035 |a DEBBGBV042991555 
035 |a ocn910102749 
035 |a FRCYB88829607 
035 |a FRCYB56788829607 
035 |a FRCYB09888829607 
035 |a FRCYB14088829607 
035 |a FRCYB17088829607 
035 |a FRCYB19188829607 
035 |a FRCYB20188829607 
035 |a FRCYB24288829607 
035 |a FRCYB24788829607 
035 |a FRCYB24888829607 
035 |a FRCYB26088829607 
035 |a FRCYB26888829607 
035 |a FRCYB27488829607 
035 |a FRCYB29388829607 
035 |a FRCYB29588829607 
035 |a FRCYB30388829607 
035 |a FRCYB55488829607 
035 |a FRCYB55988829607 
035 |a FRCYB08288829607 
035 |a FRCYB57188829607 
037 |a 6409BF55-342E-4BE0-80AC-B4D97FBA2E67  |b OverDrive, Inc 
040 |a ABES  |b fre  |e AFNOR 
041 0 |a eng  |2 639-2 
050 4 |a QA76.9.A25 
082 0 |a 005.8  |2 23 
100 1 |0 (IdRef)191312037  |1 http://www.idref.fr/191312037/id  |a Loukas, George.  |4 aut.  |e Auteur 
245 1 0 |a Cyber-physical attacks :  |b a growing invisible threat   |c George Loukas. 
256 |a Données textuelles. 
260 |a Oxford :  |b Butterworth-Heinemann is an imprint of Elsevier,  |c [2015] 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
337 |b b  |2 isbdmedia 
338 |b ceb  |2 RDAfrCarrier 
500 |a Titre provenant de la page de titre du document numérique. 
500 |a Numérisation de l'édition de San Diego, CA : Elsevier Science, 2015. 
500 |a La pagination de l'édition imprimée correspondante est de 271 p. 
504 |a Notes bibliogr. Index. 
505 0 |a Front Cover; Cyber-Physical Attacks; Copyright Page; Dedication; Contents; 1 A Cyber-Physical World; Basic Concepts and Definitions of a Cyber-Physical World; Transducers; Controllers; Embedded Systems; Cyber-Physical Systems; The Internet of Things; Defining Cyber-Physical Attacks; Who Should Read This Book; Outline; Chapter 1: A Cyber-Physical World; Chapter 2: A History of Cyber-Physical Security Incidents; Chapter 3: Cyber-Physical Attacks on Implants and Vehicles; Chapter 4: Cyber-Physical Attacks on Industrial Control Systems; Chapter 5: Cyber-Physical Attack Steps -- Chapter 6: Protection Mechanisms and Secure Design PrinciplesChapter 7: Physical-Cyber Attacks; Summary; Follow-Up Questions and Exercises; 2 A History of Cyber-Physical Security Incidents; Reported Incidents by Sector Affected; Energy; Water; Health; Transportation; Defense; A Discussion on the Cyber-Physical Security Incident Reports; Motivations; Second Order Cyber-Physical Dependencies; The Impact of Cyber-Physical Attacks; Summary; Follow-Up Questions and Exercises; 3 Cyber-Physical Attacks on Implants and Vehicles; Implantable Medical Devices; Insulin Pumps -- Implantable Cardioverter DefibrillatorsVehicles; Unmanned Aerial Vehicles; Automobiles; Summary; Follow-Up Questions and Exercises; 4 Cyber-Physical Attacks on Industrial Control Systems; SCADA; SCADA Network Vulnerabilities; Factors Affecting SCADA Security; Strict Real-Time Requirements; Continuous Availability; Misguided Security Perceptions; Commercial-off-the-Shelf Hardware and Software; Interconnectivity; Internet Accessibility; Stuxnet: A Milestone in Industrial Control System Security; The Background; The Payload and the Attack; The Delivery; The Impact and the Aftermath -- The Electric GridPower Generators; The Smart Grid; Summary; Follow-Up Questions and Exercises; 5 Cyber-Physical Attack Steps; Preliminary Research and Reconnaissance; Internet Research; Social Engineering; Watering Hole; Vulnerability Discovery; Intrusion; Full-Body Scanner; Intelligent Traffic Lights; Home Automation; Attack Delivery; Black Hole/Gray Hole; Code Injection; Command Injection; Communication Jamming; Denial of Service; False Data Injection: Communication-Based; False Data Injection: Database-Based; False Data Injection: Sensor-Based; Firmware Modification; Fuzzing; GPS Jamming -- GPS Spoofing/MeaconingMalware Infection; Man-in-the-Middle; Network Isolation; Packet Sniffing; Password Cracking; Relay Attack; Replay Attack; Rogue Node; Sleep Deprivation; Supply Chain Attack; Antiforensics; Summary; Follow-Up Questions and Exercises; 6 Protection Mechanisms and Secure Design Principles; Protection Mechanisms; Authentication; Access Control; Firewall; Intrusion Detection; Antimalware; Application Whitelisting; Flow Whitelisting; Cryptography; Integrity Verification; Survivability; Secure Design Principles; Economy of Mechanism; Defense-in-Depth; Least-Privilege 
506 |a L'accès complet à la ressource est réservé aux usagers des établissements qui en ont fait l'acquisition 
520 |a Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral outrage that would follow a more overt physical attack. Readers will learn about all aspects of this brave new world of cyber-physical attacks, along with tactics on how to defend against them. The book provides an accessible introduction to the variety of cyber-physical attacks that have already been employed or are likely to be employed in the near future 
538 |a Configuration requise : navigateur internet. 
650 7 |0 (IdRef)033217521  |1 http://www.idref.fr/033217521/id  |a Systèmes embarqués (informatique).  |2 ram 
650 7 |0 (IdRef)146775570  |1 http://www.idref.fr/146775570/id  |a Internet des objets.  |2 ram 
650 7 |0 (IdRef)027234541  |1 http://www.idref.fr/027234541/id  |a Intelligence artificielle.  |2 ram 
650 0 |a Cyber intelligence (Computer security).  |2 lc 
650 0 |a Ubiquitous computing.  |2 lc 
650 0 |a Embedded computer systems.  |2 lc 
650 0 |a Embedded Internet devices.  |2 lc 
650 0 |a Internet of things.  |2 lc 
856 |q HTML  |u https://srvext.uco.fr/login?url=https://univ.scholarvox.com/book/88829607  |w Données éditeur  |z Accès à l'E-book 
886 2 |2 unimarc  |a 181  |a i#  |b xxxe## 
993 |a E-Book  
994 |a BNUM 
995 |a 191312193