| 000 | 07141cam a22004697a 4500 | ||
|---|---|---|---|
| 999 |
_c92078 _d92078 |
||
| 005 | 20250825160212.0 | ||
| 006 | m o d | ||
| 007 | cr cnu|||||||| | ||
| 008 | 250825s2024 enkm o u000 0 eng d | ||
| 020 | _a9781837635030 | ||
| 020 | _a9781837633562 | ||
| 020 | _a1837633568 | ||
| 020 | _z183763503X | ||
| 035 |
_a(OCoLC)1432605671 _z(OCoLC)1432713234 |
||
| 037 |
_a9781837635030 _bO'Reilly Media |
||
| 040 |
_aEBLCP _beng _cEBLCP _dOCLCO _dORMDA _dOCLCO _dYDX _dN$T |
||
| 041 | _aeng | ||
| 050 | 4 | _aQA76.9.C92 | |
| 082 | 0 | 4 |
_a005.7 _223/eng/20240604 |
| 100 | 1 |
_aToledano, Soledad Antelada, _eauthor. |
|
| 245 | 1 | 0 |
_aCritical infrastructure security _bcybersecurity lessons learned from real-world breaches / _cSoledad Antelada Toledano. |
| 250 | _a1st edition. | ||
| 260 | _c2024. | ||
| 264 | 1 |
_aBirmingham : _bPackt Publishing, Limited, _c2024 |
|
| 300 | _a1 online resource | ||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 500 | _aDescription based upon print version of record. | ||
| 500 | _aCOVID-19-period cyberattack landscape. | ||
| 505 | 0 | _aCover -- Title Page -- Copyright and Credits -- Dedications -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to Critical Infrastructure and Cybersecurity Concepts -- What is Critical Infrastructure? -- Chemical sector -- Impact of a compromised chemical sector -- Cyberattack scenarios in the chemical sector -- Commercial facilities sector -- Impact of a compromised commercial facilities sector -- Cyberattack scenarios in the commercial facilities sector -- Communications sector -- Impact of a compromised communications sector. | |
| 505 | 8 | _aCyberattack scenarios in the communications sector -- Critical manufacturing sector -- Impact of a compromised critical manufacturing sector -- Cyberattack scenarios in the critical manufacturing sector -- Dams sector -- Impact of a compromised dams sector -- Cyberattack scenarios in the dams sector -- Defense industrial base sector -- Impact of a compromised defense industrial base sector -- Cyberattack scenarios in the defense industrial base sector -- Emergency services sector -- Impact of a compromised emergency services sector -- Cyberattack scenarios in the emergency services sector. | |
| 505 | 8 | _aEnergy sector -- Impact of a compromised energy sector -- Cyberattack scenarios in the energy sector -- Preventing and mitigating cyberattacks -- Financial services sector -- Impact of a compromised financial services sector -- Cyberattack scenarios in the financial services sector -- Food and agriculture services sector -- Impact of a compromised food and agriculture sector -- Cyberattack scenarios in the food and agriculture services sector -- Government facilities sector -- Impact of a compromised government facilities sector -- Cyberattack scenarios in the government facilities sector. | |
| 505 | 8 | _aHealthcare and public health sector -- Impact of a compromised healthcare and public health sector -- Cyberattack scenarios in the healthcare and public health sector -- Information technology sector -- Impact of a compromised information technology sector -- Cyberattack scenarios in the information technology sector -- Nuclear reactors, materials, and waste sector -- Impact of a compromised nuclear reactor sector -- Cyberattack scenarios in the nuclear reactor sector -- Transportation system sector -- Impact of a compromised transportation system sector. | |
| 505 | 8 | _aCyberattack scenarios in the transportation system sector -- Water and wastewater sector -- Impact of a compromised water and wastewater sector -- Cyberattack scenarios in the water and wastewater sector -- Summary -- References -- Chapter 2: The Growing Threat of Cyberattacks on Critical Infrastructure -- A brief history of CI protection and attacks -- The impact of the 9/11 attacks on CI -- Same old attacks throughout history -- Executive order 13010 -- Evolution of a nation's CI protection posture -- Evolution of cyberattacks and countermeasures -- The state of CI in the face of cyberattacks. | |
| 520 | _aVenture through the core of cyber warfare and unveil the anatomy of cyberattacks on critical infrastructure Key Features Gain an overview of the fundamental principles of cybersecurity in critical infrastructure Explore real-world case studies that provide a more exciting learning experience, increasing retention Bridge the knowledge gap associated with IT/OT convergence through practical examples Purchase of the print or Kindle book includes a free PDF eBook Book Description Discover the core of cybersecurity through gripping real-world accounts of the most common assaults on critical infrastructure - the body of vital systems, networks, and assets so essential that their continued operation is required to ensure the security of a nation, its economy, and the public's health and safety - with this guide to understanding cybersecurity principles. From an introduction to critical infrastructure and cybersecurity concepts to the most common types of attacks, this book takes you through the life cycle of a vulnerability and how to assess and manage it. You'll study real-world cybersecurity breaches, each incident providing insights into the principles and practical lessons for cyber defenders striving to prevent future breaches. From DDoS to APTs, the book examines how each threat activates, operates, and succeeds. Additionally, you'll analyze the risks posed by computational paradigms, such as the advancement of AI and quantum computing, to legacy infrastructure. By the end of this book, you'll be able to identify key cybersecurity principles that can help mitigate evolving attacks to critical infrastructure. What you will learn Understand critical infrastructure and its importance to a nation Analyze the vulnerabilities in critical infrastructure systems Acquire knowledge of the most common types of cyberattacks on critical infrastructure Implement techniques and strategies for protecting critical infrastructure from cyber threats Develop technical insights into significant cyber attacks from the past decade Discover emerging trends and technologies that could impact critical infrastructure security Explore expert predictions about cyber threats and how they may evolve in the coming years Who this book is for This book is for SOC analysts, security analysts, operational technology (OT) engineers, and operators seeking to improve the cybersecurity posture of their networks. Knowledge of IT and OT systems, along with basic networking and system administration skills, will significantly enhance comprehension. An awareness of current cybersecurity trends, emerging technologies, and the legal framework surrounding critical infrastructure is beneficial. | ||
| 650 | 0 | _aCyberinfrastructure. | |
| 650 | 0 | _aComputer security. | |
| 655 | 4 | _aElectronic books. | |
| 856 |
_yFull text is available at ProQuest Ebook Central Click here to view _uhttps://ebookcentral.proquest.com/lib/citph-ebooks/detail.action?docID=31317976 |
||
| 942 |
_2ddc _cER |
||