Add to Cart
About the author:
Written by an Architect with 37 years of experience as an employee of the Army Corps of Engineers, NAVFAC, GSA and private practice.
Cyber-Security Glossary of Building Hacks and Cyber-Attacks
Mr Luis Ayala
Buildings today are automated because the systems are complicated so we depend on the Building Controls System (BCS) to operate the equipment. We also depend on a Computerized Maintenance Management System (CMMS) to keep a record of what was repaired and to schedule required maintenance.
SCADA, BCS and CMMS can all be hacked. Maintenance staff may think the BCS is not connected to the Internet, but as a Registered Architect I have yet to see a building that is not connected to the Internet. If your building is connected to the Internet, I assure you that your BCS has already been hacked and mapped, the data in the CMMS has been exfiltrated, and backdoors have been installed.
And, if your BCS is also connected to your Enterprise network, hackers may have gotten into that thru the BCS.
If hackers get into your BCS, they own you.
Discussion of building hacks and cyber-attacks is clouded by a lack of standard definitions and a general misunderstanding about how bad actors can actually employ cyber technology as a weapon in the real world. Architects, engineers and facility engineers need to know how to defend their buildings against cyber-attack by learning more about the cyber “attack surface” which is the sum of all the “attack vectors”. The Cyber-Security Glossary of Building Hacks and Cyber-Attacks was developed specifically to introduce non-IT Managers to the vulnerability of industrial control systems (and SCADA systems) to cyber-attack.
The book includes definitions of technical terms related to equipment controls common to industry, utilities and buildings and much of the terminology applies to cyber-attacks in general. I define many types of cyber-attacks including: Cyber Drones; Dictionary attack; Cinderella attack; Time Bomb attack; Fork Bomb attack; Logic Bomb attack; Bluesnarfing; Smurf attack; Vampire Tap; Water Holing; Pass the Hash attack; Tiny Fragment attack; Protocol Fuzzing attack; Replay attack; Amplification attack; Man in the Middle attack; and many more.
Also available on Kindle
This material was printed by 4th Watch Books. 4th Watch books use high-quality paper and are tightly bound. For more information, visit: cybah.webplus.net
- Publication Date:
- 1517484871 / 9781517484873
- Page Count:
- Binding Type:
- US Trade Paper
- Trim Size:
- 8.5" x 11"
- Black and White
- Related Categories:
- Computers / Security / General