English | 21 Jun. 2016 | ISBN: 1484220676 | 216 Pages | PDF (True) | 1.34 MB
This book offers easy-to-understand definitions of cybersecurity technical terminology and hacker jargon related to automated control systems common to buildings, utilities, and industry, and explains the threats and vulnerabilities of critical infrastructure. Although written primarily for building designers and maintenance personnel, much of the terminology applies to cyber-physical attacks in general.
Buildings today are automated because the systems are complicated so we depend on the building controls system (BCS) to operate the equipment. We also depend on a computerized maintenance management system (CMMS) to keep a record of what was repaired and to schedule required maintenance. SCADA, BCS, and CMMS can all be hacked.
The Cybersecurity Lexicon puts cyber jargon related to building controls all in one place. The book is a handy desk reference for professionals interested in preventing cyber-physical attacks against their facilities in the real world.
Discussion of cybers-physical attacks on automated control systems is clouded by a lack of standard definitions and a general misunderstanding about how bad actors can actually employ cyber technology as a weapon in the real world. The book provides:
Concepts related to cyber-physical attacks and building hacks are listed alphabetically with text easily searchable by key phrase.
Definitions of technical terms related to equipment controls common to industry, utilities, and buildings-much of the terminology also applies to cybersecurity in general.
What you'll learn
Readers will be able to quickly find cybersecurity-physical attack concepts and get a simple explanation of the meaning.
Many of the most common types of cybersecurity-attacks are explained so readers can quickly assess the threat to their facilities in real time.
The definition of as facilities, engineering, and cybersecurity acronyms.
Who This Book Is For
Architects, Engineers, Building Managers, Students, Researchers and Consultants interested in cybersecurity-attacks against facilities in the real world. Also for IT professionals getting involved in cybersecurity responsibilities.
Basic Guide to System Safety
Router Security Strategies: Securing IP Network Traffic Planes
Artificial Immune System: Applications in Computer Security
Data Privacy Management, and Security Assurance
PC Hacks: 100 Industrial-Strength Tips Tools
Strategic Information Security
Performance, Stability, Dynamics, and Control of Airplanes
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Malware, Rootkits & Botnets A Beginner's G(2247)
The Dark Net Searching: how to search anon(2173)
Tor and The Dark Net: Remain Anonymous Onl(2007)
Tor Browser: The Ultimate Guide To The Tor(1974)
Hacking Made Easy: Hack Your Way Through L(1928)
Cybersecurity for Beginners(1714)
Hacking Google Maps and Google Earth(1698)
Hacking For Dummies(1556)
Computer Virus: Introducing... Computer Vi(1533)
Penetration Testing with Raspberry Pi(1518)
The Artificial Intelligence Conspiracy: Ho(1499)
Principles of Computer Security Lab Manual(1475)
Understanding SSL: Securing Your Website T(1471)
Learning Network Forensics(1448)
Cyber Security Basics: Protect your organi(1433)