Cyber-Physical Attacks - 1st Edition - ISBN: 9780128012901, 9780128014639

Cyber-Physical Attacks

1st Edition

A Growing Invisible Threat

Authors: George Loukas
eBook ISBN: 9780128014639
Paperback ISBN: 9780128012901
Imprint: Butterworth-Heinemann
Published Date: 2nd June 2015
Page Count: 270
Sales tax will be calculated at check-out Price includes VAT/GST
25% off
25% off
25% off
25% off
25% off
20% off
20% off
25% off
25% off
25% off
25% off
25% off
20% off
20% off
25% off
25% off
25% off
25% off
25% off
20% off
20% off
49.95
37.46
37.46
37.46
37.46
37.46
39.96
39.96
30.99
23.24
23.24
23.24
23.24
23.24
24.79
24.79
35.95
26.96
26.96
26.96
26.96
26.96
28.76
28.76
Unavailable
Price includes VAT/GST
× DRM-Free

Easy - Download and start reading immediately. There’s no activation process to access eBooks; all eBooks are fully searchable, and enabled for copying, pasting, and printing.

Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle.

Open - Buy once, receive and download all available eBook formats, including PDF, EPUB, and Mobi (for Kindle).

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.

Description

Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building’s lights, make a car veer off the road,  or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism.

The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral outrage that would follow a more overt physical attack.

Readers will learn about all aspects of this brave new world of cyber-physical attacks, along with tactics on how to defend against them. The book provides an accessible introduction to the variety of cyber-physical attacks that have already been employed or are likely to be employed in the near future.

Key Features

  • Demonstrates how to identify and protect against cyber-physical threats
  • Written for undergraduate students and non-experts, especially physical security professionals without computer science background
  • Suitable for training police and security professionals
  • Provides a strong understanding of the different ways in which a cyber-attack can affect physical security in a broad range of sectors
  • Includes online resources for those teaching security management

Readership

Physical Security managers and executives in both the public and private sectors; Information Security managers and executives in both the public and private sectors; Students taking courses in Computer Forensics, Computer Security, and Physical Security; and government officials, policy makers, think tanks and journalists in the security sector.

Table of Contents

  • Dedication
  • 1. A Cyber-Physical World
    • Chapter Summary
    • Basic Concepts and Definitions of a Cyber-Physical World
    • Defining Cyber-Physical Attacks
    • Who Should Read This Book
    • Outline
    • Summary
    • Follow-Up Questions and Exercises
  • 2. A History of Cyber-Physical Security Incidents
    • Chapter Summary
    • Reported Incidents by Sector Affected
    • A Discussion on the Cyber-Physical Security Incident Reports
    • Summary
    • Follow-Up Questions and Exercises
  • 3. Cyber-Physical Attacks on Implants and Vehicles
    • Chapter Summary
    • Implantable Medical Devices
    • Vehicles
    • Summary
    • Follow-Up Questions and Exercises
  • 4. Cyber-Physical Attacks on Industrial Control Systems
    • Chapter Summary
    • SCADA
    • Stuxnet: A Milestone in Industrial Control System Security
    • The Electric Grid
    • Summary
    • Follow-Up Questions and Exercises
  • 5. Cyber-Physical Attack Steps
    • Chapter Summary
    • Preliminary Research and Reconnaissance
    • Vulnerability Discovery
    • Intrusion
    • Attack Delivery
    • Antiforensics
    • Summary
    • Follow-Up Questions and Exercises
  • 6. Protection Mechanisms and Secure Design Principles
    • Chapter Summary
    • Protection Mechanisms
    • Secure Design Principles
    • Summary
    • Follow-Up Questions and Exercises
  • 7. Physical-Cyber Attacks
    • Chapter Summary
    • Breaching Availability through Damage in Physical Space
    • Breaching Integrity through Physical Manipulation of Sensor Input
    • Breaching Confidentiality through Emsec Attacks
    • Cyber-Physical-Cyber and Physical-Cyber-Physical Attacks
    • Summary
    • Follow-Up Questions and Exercises
  • Index

Details

No. of pages:
270
Language:
English
Copyright:
© Butterworth-Heinemann 2015
Published:
Imprint:
Butterworth-Heinemann
eBook ISBN:
9780128014639
Paperback ISBN:
9780128012901

About the Author

George Loukas

George Loukas is an associate professor of cyber security at University of Greenwich, London. He teaches and leads research projects in cyber-physical security, cyber-crime and digital communications, and has authored or co-authored 30 refereed journal articles, book chapters, and conference publications on cyber-physical security, cyber terrorism and related areas."

Affiliations and Expertise

Associate professor and senior lecturer of cyber-physical security at University of Greenwich, London

Reviews

"Reading this book will help us recognize an attack, identify the type of attack, and learn how to stop it. It is recommended for all security professionals who wish to be prepared for the next cyber-physical attack sure to come." --Security Management, Cyber-Physical Attacks

"…takes you most usefully through the issue…In style and content the book is commendably readable in what could have easily bogged down the non-specialist reader in computer code." --Professional Security Magazine Online

Ratings and Reviews