| 000 | 07071cam a2200829Ii 4500 | ||
|---|---|---|---|
| 005 | 20250919085810.0 | ||
| 006 | m o d | ||
| 007 | cr cnu|||unuuu | ||
| 008 | 161221s2015 enk ob 001 0 eng d | ||
| 020 |
_a9780128014639 _qelectronic bk. |
||
| 020 |
_a0128014636 _qelectronic bk. |
||
| 020 | _z9780128012901 | ||
| 029 | 1 |
_aDEBSZ _b433954108 |
|
| 029 | 1 |
_aNZ1 _b16092611 |
|
| 029 | 1 |
_aCHVBK _b341782726 |
|
| 029 | 1 |
_aCHBIS _b010547901 |
|
| 029 | 1 |
_aDEBSZ _b451526449 |
|
| 029 | 1 |
_aDEBSZ _b453330789 |
|
| 029 | 1 |
_aDEBBG _bBV042991555 |
|
| 029 | 1 |
_aZWZ _b191312193 |
|
| 029 | 1 |
_aDEBBG _bBV043620608 |
|
| 035 |
_a(OCoLC)910102749 _z(OCoLC)910446918 |
||
| 035 | _a(OCoLC)ocn910102749 | ||
| 037 |
_a6409BF55-342E-4BE0-80AC-B4D97FBA2E67 _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
| 039 | 9 |
_y12-21-2016 _zhafiz _wmetacoll.MYUKM.updates.D20160920.T210208.sdallbooks.1 (perolehan)hafizupload21122016.mrc _x158 |
|
| 040 |
_aNST _beng _erda _epn _cNST _dNST _dIDEBK _dOPELS _dYDXCP _dTEFOD _dE7B _dEBLCP _dNLGGC _dDEBSZ _dCDX _dTEFOD _dOCLCF _dVLB |
||
| 049 | _aMAIN | ||
| 050 | 4 |
_aQA76.9.A25 _bL68 2015eb |
|
| 072 | 7 |
_aCOM _x060040 _2bisacsh |
|
| 072 | 7 |
_aCOM _x043050 _2bisacsh |
|
| 072 | 7 |
_aCOM _x053000 _2bisacsh |
|
| 082 | 0 | 4 |
_a005.8 _223 |
| 100 | 1 |
_aLoukas, George, _eauthor. |
|
| 245 | 1 | 0 |
_aCyber-physical attacks : _ba growing invisible threat / _cGeorge Loukas. |
| 264 | 1 |
_aOxford : _bButterworth-Heinemann is an imprint of Elsevier, _c[2015] |
|
| 300 | _a1 online resource | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aFront Cover; Cyber-Physical Attacks; Copyright Page; Dedication; Contents; 1 A Cyber-Physical World; Basic Concepts and Definitions of a Cyber-Physical World; Transducers; Controllers; Embedded Systems; Cyber-Physical Systems; The Internet of Things; Defining Cyber-Physical Attacks; Who Should Read This Book; Outline; Chapter 1: A Cyber-Physical World; Chapter 2: A History of Cyber-Physical Security Incidents; Chapter 3: Cyber-Physical Attacks on Implants and Vehicles; Chapter 4: Cyber-Physical Attacks on Industrial Control Systems; Chapter 5: Cyber-Physical Attack Steps | |
| 505 | 8 | _aChapter 6: Protection Mechanisms and Secure Design PrinciplesChapter 7: Physical-Cyber Attacks; Summary; Follow-Up Questions and Exercises; 2 A History of Cyber-Physical Security Incidents; Reported Incidents by Sector Affected; Energy; Water; Health; Transportation; Defense; A Discussion on the Cyber-Physical Security Incident Reports; Motivations; Second Order Cyber-Physical Dependencies; The Impact of Cyber-Physical Attacks; Summary; Follow-Up Questions and Exercises; 3 Cyber-Physical Attacks on Implants and Vehicles; Implantable Medical Devices; Insulin Pumps | |
| 505 | 8 | _aImplantable Cardioverter DefibrillatorsVehicles; Unmanned Aerial Vehicles; Automobiles; Summary; Follow-Up Questions and Exercises; 4 Cyber-Physical Attacks on Industrial Control Systems; SCADA; SCADA Network Vulnerabilities; Factors Affecting SCADA Security; Strict Real-Time Requirements; Continuous Availability; Misguided Security Perceptions; Commercial-off-the-Shelf Hardware and Software; Interconnectivity; Internet Accessibility; Stuxnet: A Milestone in Industrial Control System Security; The Background; The Payload and the Attack; The Delivery; The Impact and the Aftermath | |
| 505 | 8 | _aThe Electric GridPower Generators; The Smart Grid; Summary; Follow-Up Questions and Exercises; 5 Cyber-Physical Attack Steps; Preliminary Research and Reconnaissance; Internet Research; Social Engineering; Watering Hole; Vulnerability Discovery; Intrusion; Full-Body Scanner; Intelligent Traffic Lights; Home Automation; Attack Delivery; Black Hole/Gray Hole; Code Injection; Command Injection; Communication Jamming; Denial of Service; False Data Injection: Communication-Based; False Data Injection: Database-Based; False Data Injection: Sensor-Based; Firmware Modification; Fuzzing; GPS Jamming | |
| 505 | 8 | _aGPS Spoofing/MeaconingMalware Infection; Man-in-the-Middle; Network Isolation; Packet Sniffing; Password Cracking; Relay Attack; Replay Attack; Rogue Node; Sleep Deprivation; Supply Chain Attack; Antiforensics; Summary; Follow-Up Questions and Exercises; 6 Protection Mechanisms and Secure Design Principles; Protection Mechanisms; Authentication; Access Control; Firewall; Intrusion Detection; Antimalware; Application Whitelisting; Flow Whitelisting; Cryptography; Integrity Verification; Survivability; Secure Design Principles; Economy of Mechanism; Defense-in-Depth; Least-Privilege | |
| 520 | _aCyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building's lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism. The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral outrage that would follow a more overt physical attack. Readers will learn about all aspects of this brave new world of cyber-physical attacks, along with tactics on how to defend against them. The book provides an accessible introduction to the variety of cyber-physical attacks that have already been employed or are likely to be employed in the near future. | ||
| 588 | 0 | _aOnline resource; title from PDF title page (Ebsco, viewed May 27, 2015). | |
| 590 |
_aElsevier _bScienceDirect All Books |
||
| 650 | 0 | _aCyber intelligence (Computer security) | |
| 650 | 0 | _aUbiquitous computing. | |
| 650 | 0 | _aEmbedded computer systems. | |
| 650 | 0 | _aEmbedded Internet devices. | |
| 650 | 0 | _aInternet of things. | |
| 650 | 7 |
_aCOMPUTERS / Internet Security _2bisacsh |
|
| 650 | 7 |
_aCOMPUTERS / Networking / Security _2bisacsh |
|
| 650 | 7 |
_aCOMPUTERS / Security / General _2bisacsh |
|
| 650 | 7 |
_aCyber intelligence (Computer security) _2fast _0(OCoLC)fst01893401 |
|
| 650 | 7 |
_aEmbedded computer systems. _2fast _0(OCoLC)fst00908298 |
|
| 650 | 7 |
_aEmbedded Internet devices. _2fast _0(OCoLC)fst01742162 |
|
| 650 | 7 |
_aInternet of things. _2fast _0(OCoLC)fst01894151 |
|
| 650 | 7 |
_aUbiquitous computing. _2fast _0(OCoLC)fst01160283 |
|
| 655 | 4 | _aElectronic books. | |
| 655 | 0 | _aElectronic books. | |
| 776 | 0 | 8 |
_iPrint version: _aLoukas, George _tCyber-Physical Attacks : A Growing Invisible Threat _dBurlington : Elsevier Science,c2015 _z9780128012901 |
| 856 | 4 | 0 | _uhttps://eresourcesptsl.ukm.remotexs.co/user/login?url=http://www.sciencedirect.com/science/book/9780128012901 |
| 907 |
_a.b16400768 _b2022-11-01 _c2019-11-12 |
||
| 942 | _n0 | ||
| 914 | _avtls003614181 | ||
| 998 |
_ae _b2016-08-12 _cm _dz _feng _genk _y0 _z.b16400768 |
||
| 999 |
_c613462 _d613462 |
||