Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
Learn the threats and vulnerabilities of critical infrastructure to cybersecurity attack. Definitions are provided for cybersecurity technical terminology and hacker jargon related to automated control systems common to buildings, utilities, and industry.
Buildings today are automated because the systems are complicated and so we depend on the building controls system (BCS) to operate the equipment. We also depend on a computerized maintenance management system (CMMS) to keep a record of what was repaired and to schedule required maintenance. SCADA, BCS, and CMMS all can be hacked.
The Cybersecurity Lexicon puts cyber jargon related to building controls all in one place. The book is a handy desk reference for professionals interested in preventing cyber-physical attacks against their facilities in the real world.
Discussion of attacks on automated control systems is clouded by a lack of standard definitions and a general misunderstanding abouthow bad actors can actually employ cyber technology as a weapon in the real world. This book covers:
What You'll learn
Who This Book Is For
Luis Ayala worked over 25 years for the Department of Defense with the past 11 years at the Defense Intelligence Agency. Prior to his appointment as a Defense Intelligence Senior Leader in 2008, he held several leadership positions at the Branch and Division levels.
His tenure culminated with the position as Senior Technical Expert (facilities/construction). Mr. Ayala earned his Bachelor of Architecture degree from Pratt Institute and he received his Master of Science and Technology Intelligence from the National Intelligence University. NIU is the Intelligence Community's sole accredited, federal degree granting institution. His Master's thesis titled "Cybersecure Facilities for the Intelligence Community" is classified. Mr. Ayala was awarded the DIA Civilian Expeditionary Medal and the Civilian Combat Support Medal.
Chapter 1: #.- Chapter 2: A.- Chapter 3: B.- Chapter 4: C.- Chapter 5: D.- Chapter 6: E.- Chapter 7: F.- Chapter 8: G.- Chapter 9: H.- Chapter 10: I.- Chapter 11: J.- Chapter 12: K.- Chapter 13: L.- Chapter 14: M.- Chapter 15: N.- Chapter 16: O.- Chapter 17: P.- Chapter 18: Q.- Chapter 19: R.- Chapter 20: S.- Chapter 21: T.- Chapter 22: U.- Chapter 23: V.- Chapter 24: W.- Chapter 25: X.- Chapter 26: Y.- Chapter 27: Z.- Chapter 28: Facilities, Engineering, and Cyber Acronyms.- Chapter 29: Cyber Standards.
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.