000 07071cam a2200829Ii 4500
005 20250919085810.0
006 m o d
007 cr cnu|||unuuu
008 161221s2015 enk ob 001 0 eng d
020 _a9780128014639
_qelectronic bk.
020 _a0128014636
_qelectronic bk.
020 _z9780128012901
029 1 _aDEBSZ
_b433954108
029 1 _aNZ1
_b16092611
029 1 _aCHVBK
_b341782726
029 1 _aCHBIS
_b010547901
029 1 _aDEBSZ
_b451526449
029 1 _aDEBSZ
_b453330789
029 1 _aDEBBG
_bBV042991555
029 1 _aZWZ
_b191312193
029 1 _aDEBBG
_bBV043620608
035 _a(OCoLC)910102749
_z(OCoLC)910446918
035 _a(OCoLC)ocn910102749
037 _a6409BF55-342E-4BE0-80AC-B4D97FBA2E67
_bOverDrive, Inc.
_nhttp://www.overdrive.com
039 9 _y12-21-2016
_zhafiz
_wmetacoll.MYUKM.updates.D20160920.T210208.sdallbooks.1 (perolehan)hafizupload21122016.mrc
_x158
040 _aNST
_beng
_erda
_epn
_cNST
_dNST
_dIDEBK
_dOPELS
_dYDXCP
_dTEFOD
_dE7B
_dEBLCP
_dNLGGC
_dDEBSZ
_dCDX
_dTEFOD
_dOCLCF
_dVLB
049 _aMAIN
050 4 _aQA76.9.A25
_bL68 2015eb
072 7 _aCOM
_x060040
_2bisacsh
072 7 _aCOM
_x043050
_2bisacsh
072 7 _aCOM
_x053000
_2bisacsh
082 0 4 _a005.8
_223
100 1 _aLoukas, George,
_eauthor.
245 1 0 _aCyber-physical attacks :
_ba growing invisible threat /
_cGeorge Loukas.
264 1 _aOxford :
_bButterworth-Heinemann is an imprint of Elsevier,
_c[2015]
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
504 _aIncludes bibliographical references and index.
505 0 _aFront Cover; Cyber-Physical Attacks; Copyright Page; Dedication; Contents; 1 A Cyber-Physical World; Basic Concepts and Definitions of a Cyber-Physical World; Transducers; Controllers; Embedded Systems; Cyber-Physical Systems; The Internet of Things; Defining Cyber-Physical Attacks; Who Should Read This Book; Outline; Chapter 1: A Cyber-Physical World; Chapter 2: A History of Cyber-Physical Security Incidents; Chapter 3: Cyber-Physical Attacks on Implants and Vehicles; Chapter 4: Cyber-Physical Attacks on Industrial Control Systems; Chapter 5: Cyber-Physical Attack Steps
505 8 _aChapter 6: Protection Mechanisms and Secure Design PrinciplesChapter 7: Physical-Cyber Attacks; Summary; Follow-Up Questions and Exercises; 2 A History of Cyber-Physical Security Incidents; Reported Incidents by Sector Affected; Energy; Water; Health; Transportation; Defense; A Discussion on the Cyber-Physical Security Incident Reports; Motivations; Second Order Cyber-Physical Dependencies; The Impact of Cyber-Physical Attacks; Summary; Follow-Up Questions and Exercises; 3 Cyber-Physical Attacks on Implants and Vehicles; Implantable Medical Devices; Insulin Pumps
505 8 _aImplantable Cardioverter DefibrillatorsVehicles; Unmanned Aerial Vehicles; Automobiles; Summary; Follow-Up Questions and Exercises; 4 Cyber-Physical Attacks on Industrial Control Systems; SCADA; SCADA Network Vulnerabilities; Factors Affecting SCADA Security; Strict Real-Time Requirements; Continuous Availability; Misguided Security Perceptions; Commercial-off-the-Shelf Hardware and Software; Interconnectivity; Internet Accessibility; Stuxnet: A Milestone in Industrial Control System Security; The Background; The Payload and the Attack; The Delivery; The Impact and the Aftermath
505 8 _aThe Electric GridPower Generators; The Smart Grid; Summary; Follow-Up Questions and Exercises; 5 Cyber-Physical Attack Steps; Preliminary Research and Reconnaissance; Internet Research; Social Engineering; Watering Hole; Vulnerability Discovery; Intrusion; Full-Body Scanner; Intelligent Traffic Lights; Home Automation; Attack Delivery; Black Hole/Gray Hole; Code Injection; Command Injection; Communication Jamming; Denial of Service; False Data Injection: Communication-Based; False Data Injection: Database-Based; False Data Injection: Sensor-Based; Firmware Modification; Fuzzing; GPS Jamming
505 8 _aGPS Spoofing/MeaconingMalware Infection; Man-in-the-Middle; Network Isolation; Packet Sniffing; Password Cracking; Relay Attack; Replay Attack; Rogue Node; Sleep Deprivation; Supply Chain Attack; Antiforensics; Summary; Follow-Up Questions and Exercises; 6 Protection Mechanisms and Secure Design Principles; Protection Mechanisms; Authentication; Access Control; Firewall; Intrusion Detection; Antimalware; Application Whitelisting; Flow Whitelisting; Cryptography; Integrity Verification; Survivability; Secure Design Principles; Economy of Mechanism; Defense-in-Depth; Least-Privilege
520 _aCyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral outrage that would follow a more overt physical attack. Readers will learn about all aspects of this brave new world of cyber-physical attacks, along with tactics on how to defend against them. The book provides an accessible introduction to the variety of cyber-physical attacks that have already been employed or are likely to be employed in the near future.
588 0 _aOnline resource; title from PDF title page (Ebsco, viewed May 27, 2015).
590 _aElsevier
_bScienceDirect All Books
650 0 _aCyber intelligence (Computer security)
650 0 _aUbiquitous computing.
650 0 _aEmbedded computer systems.
650 0 _aEmbedded Internet devices.
650 0 _aInternet of things.
650 7 _aCOMPUTERS / Internet Security
_2bisacsh
650 7 _aCOMPUTERS / Networking / Security
_2bisacsh
650 7 _aCOMPUTERS / Security / General
_2bisacsh
650 7 _aCyber intelligence (Computer security)
_2fast
_0(OCoLC)fst01893401
650 7 _aEmbedded computer systems.
_2fast
_0(OCoLC)fst00908298
650 7 _aEmbedded Internet devices.
_2fast
_0(OCoLC)fst01742162
650 7 _aInternet of things.
_2fast
_0(OCoLC)fst01894151
650 7 _aUbiquitous computing.
_2fast
_0(OCoLC)fst01160283
655 4 _aElectronic books.
655 0 _aElectronic books.
776 0 8 _iPrint version:
_aLoukas, George
_tCyber-Physical Attacks : A Growing Invisible Threat
_dBurlington : Elsevier Science,c2015
_z9780128012901
856 4 0 _uhttps://eresourcesptsl.ukm.remotexs.co/user/login?url=http://www.sciencedirect.com/science/book/9780128012901
907 _a.b16400768
_b2022-11-01
_c2019-11-12
942 _n0
914 _avtls003614181
998 _ae
_b2016-08-12
_cm
_dz
_feng
_genk
_y0
_z.b16400768
999 _c613462
_d613462