Muutke küpsiste eelistusi

E-raamat: Cyber-Physical Attack Recovery Procedures: A Step-by-Step Preparation and Response Guide

  • Formaat: PDF+DRM
  • Ilmumisaeg: 08-Jun-2016
  • Kirjastus: APress
  • Keel: eng
  • ISBN-13: 9781484220658
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 67,91 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 08-Jun-2016
  • Kirjastus: APress
  • Keel: eng
  • ISBN-13: 9781484220658
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same timeeven from the other side of the planet.





Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you probably wont suspect it was a hackeruntil you see a pattern. The building control system (BCS) will act "squirrelly" and you will knowit really is a cyber-physical attack.





Once a cyber-physical attack occurs, it can mean years of court cases, job losses, higher insurance rates, and maybe even criminal litigation. It also takes years to overcome the loss of safety credibility to your employees and the local community. Cyber-Physical Attack Recovery Procedures provides a detailed guide to taking the right steps ahead of time, and equipping your facility and employees with the training, knowledge, and tools they need and may save lives.

The book contains:









A one-of-a-kind action plan describing how hackers attack building equipment, the extent of damage possible, and how to respond when a cyber-physical attack occurs. Detailed descriptions of cyber-physical attacks directed against SCADA systems or building controls, as well as cyber booby traps  Invaluable appendices, including: Emergency Procedures, Team Staffing and Tasking, Alternate Site Procedures, a Documentation List, Software and Hardware Inventories, Vendor Contact Lists, External Support Agreements, and much more.

























What youll learn













Possible ways hackers cancause building equipment to fail.

How to quickly assess the threat to his facilities in real time, how to stop a cyber-physical attack.

How to restore equipment operation without doing any more damage.



























Who This Book Is For









Architects, Engineers, Building Managers, Students, Researchers and Consultants interested in cybersecurity-attacks against facilities in the real world. Also for IT professionals getting involved in cybersecurity responsibilities.
About the Author xiii
About the Technical Reviewer xv
Introduction xvii
Chapter 1 Cyber-Physical Attack Recovery Procedures 1(14)
Purpose of the Recovery Procedures
2(3)
Cyber-Physical Attack Timetable
5(1)
Recovery Procedures Information
6(1)
Applicable Directives
6(1)
Objectives for a Plan
6(1)
Incident Response Teams
7(1)
Recovery Management Team (MGMT)
8(1)
General Activities
8(1)
Procedures by Phase
8(1)
Recovery Facilities Team (FAC)
9(1)
Procedures by Phase
9(1)
Recovery Tech Support Team (TECH)
9(1)
Procedures by Phase
10(1)
Recovery Security Team (SEC)
10(1)
Procedures by Phase
10(1)
Recovery Phases
11(2)
Phase 1: Detection
11(1)
Phase 2: Mitigation
12(1)
Phase 3: Recovery
13(1)
Assumptions
13(1)
Critical Success Factors
13(1)
Mission Critical Systems
13(2)
Chapter 2 Threats and Attack Detection 15(12)
Probable Threats
15(6)
Cyber-Physical Attack Detection
17(4)
Incident Response Tools
21(2)
Incident Categorization
21(2)
Mitigation
23(1)
Troubleshooting
23(4)
Step 1: Confirm that the "event" is a Cyber-physical Attack
24(1)
Step 2: Slow Down the Attack. Assume that the BCS is no Longer Under your Command
24(1)
Step 3: Stop the Attack. Shut Down the BCS
24(1)
Step 4: Assess the Damage to Whatever Failed, but Assume that all Equipment was Hacked
25(1)
Step 5: Replace Infected Servers and Repair Damaged Building Equipment
25(1)
Step 6: Reload the BCS and Restart Automatic Operation
25(2)
Chapter 3 Prevent Hackers from Destroying a Boiler 27(6)
Boiler Explosion
28(1)
Hot Water Heater Explosion
29(1)
Low Water Conditions
30(1)
Preventive Measures
30(1)
Improper Warm-up
31(1)
Start-up Procedures
31(1)
Start-up Checks
31(2)
Chapter 4 Prevent Hackers from Destroying a Pressure Vessel 33(2)
Chapter 5 Prevent Hackers from Destroying Chillers 35(2)
Troubleshooting Chillers
36(1)
Chiller Cyber-Attack Tree
36(1)
Chapter 6 Prevent Hackers from Destroying a Gas Fuel Train 37(2)
Chapter 7 Prevent Hackers from Destroying a Cooling Tower 39(2)
Troubleshooting Cooling Towers
39(2)
Chapter 8 Prevent Hackers from Destroying a Backup Generator 41(2)
Chapter 9 Prevent Hackers from Destroying Switchgear 43(2)
Chapter 10 Eight Steps to Defending Building Control Systems 45(2)
Discontinue Remote Connections to the BCS
45(1)
Implement Application Whitelisting
45(1)
Systematic Patch Management Regimen
45(1)
Reduce the Attack Surface
46(1)
Build a Defendable Network Environment
46(1)
Manage Authentication
46(1)
Monitor and Respond
46(1)
Do Not Use BCS Workstations for Anything Else
46(1)
Chapter 11 Block Hacker Surveillance of Your Buildings 47(2)
Chapter 12 Cyber-Physical Attack Recovery Procedures Template 49(108)
Start Here
51(11)
Event Ticket
53(2)
Incident Response Team
55(2)
Incident Response Team Member Listing
57(1)
Equipment Recovery Priority List
58(1)
BCS Notifications Report
59(1)
Patch Management Report
60(1)
Vulnerability Assessments History
61(1)
Phase 1: Detection
62(1)
Observables
62(1)
Real-World Alerts
62(1)
Virtual-World Alerts
63(1)
Intrusion Detection System Alerts
64(6)
Event Diagnostics Table
66(2)
Master List Of Deficiencies
68(1)
Decision Time
69(1)
Phase 2: Mitigation
70(44)
Mitigation and Segmentation
70(1)
Building Equipment Damage Assessments
70(1)
BCS Network Integrity Checks
71(1)
Server/Workstation Process Checks
71(1)
BCS Integrity Checks
72(1)
Building Controls System Information
73(2)
BCS Server Details
75(1)
Building Inspection
76(1)
Equipment Or Service Failure Report
77(1)
Damage Assessment Activities
78(1)
Rapid Inspection Checklists
79(1)
Cooling Tower
80(2)
Boiler Or Pressure Vessel
82(2)
Boiler Visual Inspection
84(1)
Boiler Or Pressure Vessel
85(2)
Chilled Water System
87(1)
Chiller Visual Inspection
88(1)
Chilled Water System Checklist
89(2)
Air Handling Unit Checklist
91(1)
Air Handling Unit Visual Inspection
92(1)
Computer Room Air Conditioner
93(1)
Pump: Primary Chilled Water
94(1)
Pump: Secondary Chilled Water
95(1)
Pump: Primary Domestic Hot Water
96(1)
Pump: Secondary Domestic Hot Water
97(1)
Fan Coil Unit
98(1)
Diesel Backup Generator
99(1)
Diesel System Checklist
100(2)
Lube Oil System
102(1)
Lube Oil System Checklist
103(2)
Ventilation System Checklist
105(1)
Ventilation System
106(2)
Electrical Switchgear Inspection
108(1)
Electrical Switchgear Checklist
109(2)
Restart Operating Conditions
111(3)
Phase 3: Recovery
114(36)
Recovery Event Recording Form
115(1)
Building Controls System
116(2)
Building Controls System Field Test
118(1)
Boiler Or Pressure Vessel
119(1)
Chilled Water System
120(2)
Air Handling Unit
122(3)
Computer Room Air Conditioner
125(1)
Cooling Tower
126(1)
Pump: Primary Chilled Water
127(2)
Pump: Secondary Chilled Water
129(2)
Pump: Primary Domestic Hot Water
131(2)
Pump: Secondary Domestic Hot Water
133(2)
Fan Coil Unit
135(1)
Diesel Backup Generator
136(1)
Ventilation Unit
137(2)
Electrical Switchgear Checklist
139(1)
Integrated Systems Test: Emergency Power
140(1)
Integrated Systems Test: Emergency Power
141(1)
Integrated Systems Test: Emergency Power
142(1)
Operational Security Log
143(1)
HVAC Control System Drawings
144(1)
Valve Schedule
144(1)
Damper Schedule
145(1)
Thermostat And Occupancy Sensor Schedule
146(1)
Building Equipment Schedule
147(1)
Building Occupancy Schedule
148(2)
Points Schedule
150(7)
Building Control Network Riser Diagram
151(1)
Sequence Of Operation
151(1)
Performance Verification Test Results
152(1)
Commissioning Report
153(1)
Equipment Maintenance Manuals
153(1)
List Of Authorized Maintenance Laptops
154(1)
Vendor Contact List
155(2)
Index 157
Luis Ayala worked over 25 years for the Department of Defense with the past 11 years at the Defense Intelligence Agency. Prior to his appointment as a Defense Intelligence Senior Leader in 2008, he held several leadership positions at the Branch and Division levels.





His tenure culminated with the position as Senior Technical Expert (facilities/construction). Mr. Ayala earned his Bachelor of Architecture degree from Pratt Institute and he received his Master of Science and Technology Intelligence from the National Intelligence University. NIU is the Intelligence Communitys sole accredited, federal degree granting institution. His Masters thesis titled Cybersecure Facilities for the Intelligence Community is classified. Mr. Ayala was awarded the DIA Civilian Expeditionary Medal and the Civilian Combat Support Medal.