Book description
This book offers easy-to-understand definitions of cybersecurity technical terminology and hacker jargon related to automated control systems common to buildings, utilities, and industry, and explains the threats and vulnerabilities of critical infrastructure. Although written primarily for building designers and maintenance personnel, much of the terminology applies to cyber-physical attacks in general.
Buildings today are automated because the systems are complicated so we depend on the building controls system (BCS) to operate the equipment. We also depend on a computerized maintenance management system (CMMS) to keep a record of what was repaired and to schedule required maintenance. SCADA, BCS, and CMMS can all be hacked.
The Cybersecurity Lexicon puts cyber jargon related to building controls all in one place. The book is a handy desk reference for professionals interested in preventing cyber-physical attacks against their facilities in the real world.
Discussion of cybers-physical attacks on automated control systems is clouded by a lack of standard definitions and a general misunderstanding about how bad actors can actually employ cyber technology as a weapon in the real world. The book provides:
Table of contents
- Cover
- Title
- Copyright
- Dedication
- Contents
- About the Author
- About the Technical Reviewer
- Preface
- Chapter 1: #
- Chapter 2: A
- Chapter 3: B
- Chapter 4: C
- Chapter 5: D
- Chapter 6: E
- Chapter 7: F
- Chapter 8: G
- Chapter 9: H
- Chapter 10: I
- Chapter 11: J
- Chapter 12: K
- Chapter 13: L
- Chapter 14: M
- Chapter 15: N
- Chapter 16: O
- Chapter 17: P
- Chapter 18: Q
- Chapter 19: R
- Chapter 20: S
- Chapter 21: T
- Chapter 22: U
- Chapter 23: V
- Chapter 24: W
- Chapter 25: X, Y
- Chapter 26: Z
- Chapter 27: Facilities, Engineering, and Cyber Acronyms
- Chapter 28: Cyber Standards
Product information
- Title: Cybersecurity Lexicon
- Author(s):
- Release date: June 2016
- Publisher(s): Apress
- ISBN: 9781484220689
You might also like
book
Cybersecurity of Industrial Systems
How to manage the cybersecurity of industrial systems is a crucial question. To implement relevant solutions, …
book
Practical Internet of Things Security - Second Edition
A practical, indispensable security guide that will navigate you through the complex realm of securely building …
book
The Business-Minded CISO
This book describes the thought process and specific activities a leader should consider as they interview …
book
Voice over IP Fundamentals
A systematic approach to understanding the basics of Voice over IP Understand the basics of PSTN …