Cyber-physical attacks: a growing invisible threat

Front Cover; Cyber-Physical Attacks; Copyright Page; Dedication; Contents; 1 A Cyber-Physical World; Basic Concepts and Definitions of a Cyber-Physical World; Transducers; Controllers; Embedded Systems; Cyber-Physical Systems; The Internet of Things; Defining Cyber-Physical Attacks; Who Should Read...

Full description

Saved in:  
Bibliographic Details
Main Author: Loukas, George (Author)
Format: Print Book
Language:English
Published: Amsterdam Boston Heidelberg London Elsevier, BH [2015]
In:Year: 2015
Online Access: Inhaltsverzeichnis (Verlag)
Inhaltsverzeichnis (Verlag)
Check availability: HBZ Gateway
Subito Delivery Service: Order now.
Keywords:

MARC

LEADER 00000cam a2200000 4500
001 1616538767
003 DE-627
005 20230109180134.0
007 tu
008 150715s2015 ne ||||| 00| ||eng c
020 |a 9780128012901  |9 978-0-12-801290-1 
020 |a 0128012900  |9 0-12-801290-0 
035 |a (DE-627)1616538767 
035 |a (DE-576)445650486 
035 |a (DE-599)BSZ445650486 
035 |a (OCoLC)935885268 
035 |a (OCoLC)915331262 
035 |a (AT-OBV)AC12313311 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
044 |c XA-NL  |c XD-US  |c XA-DE  |c XA-GB 
050 0 |a QA76.9.A25 
050 0 |a HV6773 
050 0 |a HV6773  |a QA76.9.A25 
082 0 |a 364.1/68  |2 23 
082 0 |a 364.168 
100 1 |a Loukas, George  |e VerfasserIn  |0 (DE-588)1080839011  |0 (DE-627)84529508X  |0 (DE-576)453783929  |4 aut 
109 |a Loukas, George 
245 1 0 |a Cyber-physical attacks  |b a growing invisible threat  |c George Loukas 
264 1 |a Amsterdam  |a Boston  |a Heidelberg  |a London  |b Elsevier, BH  |c [2015] 
264 4 |c © 2015 
300 |a viiii, 262 Seiten.  |b Illustrationen, Diagramme 
336 |a Text  |b txt  |2 rdacontent 
337 |a ohne Hilfsmittel zu benutzen  |b n  |2 rdamedia 
338 |a Band  |b nc  |2 rdacarrier 
520 |a Front Cover; Cyber-Physical Attacks; Copyright Page; Dedication; Contents; 1 A Cyber-Physical World; Basic Concepts and Definitions of a Cyber-Physical World; Transducers; Controllers; Embedded Systems; Cyber-Physical Systems; The Internet of Things; Defining Cyber-Physical Attacks; Who Should Read This Book; Outline; Chapter 1: A Cyber-Physical World; Chapter 2: A History of Cyber-Physical Security Incidents; Chapter 3: Cyber-Physical Attacks on Implants and Vehicles; Chapter 4: Cyber-Physical Attacks on Industrial Control Systems; Chapter 5: Cyber-Physical Attack Steps. - Chapter 6: Protection Mechanisms and Secure Design PrinciplesChapter 7: Physical-Cyber Attacks; Summary; Follow-Up Questions and Exercises; 2 A History of Cyber-Physical Security Incidents; Reported Incidents by Sector Affected; Energy; Water; Health; Transportation; Defense; A Discussion on the Cyber-Physical Security Incident Reports; Motivations; Second Order Cyber-Physical Dependencies; The Impact of Cyber-Physical Attacks; Summary; Follow-Up Questions and Exercises; 3 Cyber-Physical Attacks on Implants and Vehicles; Implantable Medical Devices; Insulin Pumps. - Implantable Cardioverter DefibrillatorsVehicles; Unmanned Aerial Vehicles; Automobiles; Summary; Follow-Up Questions and Exercises; 4 Cyber-Physical Attacks on Industrial Control Systems; SCADA; SCADA Network Vulnerabilities; Factors Affecting SCADA Security; Strict Real-Time Requirements; Continuous Availability; Misguided Security Perceptions; Commercial-off-the-Shelf Hardware and Software; Interconnectivity; Internet Accessibility; Stuxnet: A Milestone in Industrial Control System Security; The Background; The Payload and the Attack; The Delivery; The Impact and the Aftermath 
650 0 |a Cyber intelligence (Computer security) 
650 0 |a Ubiquitous Computing 
650 0 |a Embedded computer systems 
650 0 |a Embedded Internet devices 
650 0 |a Internet of things 
650 0 |a Cyber intelligence (Computer security) 
650 0 |a Ubiquitous Computing 
650 0 |a Embedded computer systems 
650 0 |a Embedded Internet devices 
650 0 |a Internet of things 
689 0 0 |d s  |0 (DE-588)7713781-4  |0 (DE-627)633870307  |0 (DE-576)327984538  |a Internet der Dinge  |2 gnd 
689 0 1 |d s  |0 (DE-588)4657367-7  |0 (DE-627)335589820  |0 (DE-576)214729141  |a Ubiquitous Computing  |2 gnd 
689 0 2 |d s  |0 (DE-588)4396978-1  |0 (DE-627)191533580  |0 (DE-576)212005545  |a Eingebettetes System  |2 gnd 
689 0 3 |d s  |0 (DE-588)4274324-2  |0 (DE-627)104467525  |0 (DE-576)21070585X  |a Computersicherheit  |2 gnd 
689 0 |5 (DE-627) 
856 4 2 |u http://www.gbv.de/dms/ilmenau/toc/830060103.PDF  |m V:DE-601  |m B:DE-ilm1  |q pdf/application  |x Verlag  |y Inhaltsverzeichnis  |3 Inhaltsverzeichnis 
856 4 2 |u https://swbplus.bsz-bw.de/bsz445650486inh.htm  |m B:DE-576;DE-Frei85  |q application/pdf  |v 20151023161023  |x Verlag  |3 Inhaltsverzeichnis 
889 |w (DE-627)830060103 
935 |a mkri 
935 |i mdedup 
951 |a BO 
ELC |b 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 320102032X 
LOK |0 003 DE-627 
LOK |0 004 1616538767 
LOK |0 005 20151022094605 
LOK |0 008 150921||||||||||||||||ger||||||| 
LOK |0 040   |a DE-Frei85  |c DE-627  |d DE-Frei85 
LOK |0 852   |a DE-Frei85 
LOK |0 852 1  |m p  |9 00 
LOK |0 938   |k p 
ORI |a SA-MARC-krimdoka001.raw