000 07141cam a22004697a 4500
999 _c92078
_d92078
005 20250825160212.0
006 m o d
007 cr cnu||||||||
008 250825s2024 enkm o u000 0 eng d
020 _a9781837635030
020 _a9781837633562
020 _a1837633568
020 _z183763503X
035 _a(OCoLC)1432605671
_z(OCoLC)1432713234
037 _a9781837635030
_bO'Reilly Media
040 _aEBLCP
_beng
_cEBLCP
_dOCLCO
_dORMDA
_dOCLCO
_dYDX
_dN$T
041 _aeng
050 4 _aQA76.9.C92
082 0 4 _a005.7
_223/eng/20240604
100 1 _aToledano, Soledad Antelada,
_eauthor.
245 1 0 _aCritical infrastructure security
_bcybersecurity lessons learned from real-world breaches /
_cSoledad Antelada Toledano.
250 _a1st edition.
260 _c2024.
264 1 _aBirmingham :
_bPackt Publishing, Limited,
_c2024
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
500 _aDescription based upon print version of record.
500 _aCOVID-19-period cyberattack landscape.
505 0 _aCover -- Title Page -- Copyright and Credits -- Dedications -- Contributors -- Table of Contents -- Preface -- Part 1: Introduction to Critical Infrastructure and Cybersecurity Concepts -- What is Critical Infrastructure? -- Chemical sector -- Impact of a compromised chemical sector -- Cyberattack scenarios in the chemical sector -- Commercial facilities sector -- Impact of a compromised commercial facilities sector -- Cyberattack scenarios in the commercial facilities sector -- Communications sector -- Impact of a compromised communications sector.
505 8 _aCyberattack scenarios in the communications sector -- Critical manufacturing sector -- Impact of a compromised critical manufacturing sector -- Cyberattack scenarios in the critical manufacturing sector -- Dams sector -- Impact of a compromised dams sector -- Cyberattack scenarios in the dams sector -- Defense industrial base sector -- Impact of a compromised defense industrial base sector -- Cyberattack scenarios in the defense industrial base sector -- Emergency services sector -- Impact of a compromised emergency services sector -- Cyberattack scenarios in the emergency services sector.
505 8 _aEnergy sector -- Impact of a compromised energy sector -- Cyberattack scenarios in the energy sector -- Preventing and mitigating cyberattacks -- Financial services sector -- Impact of a compromised financial services sector -- Cyberattack scenarios in the financial services sector -- Food and agriculture services sector -- Impact of a compromised food and agriculture sector -- Cyberattack scenarios in the food and agriculture services sector -- Government facilities sector -- Impact of a compromised government facilities sector -- Cyberattack scenarios in the government facilities sector.
505 8 _aHealthcare and public health sector -- Impact of a compromised healthcare and public health sector -- Cyberattack scenarios in the healthcare and public health sector -- Information technology sector -- Impact of a compromised information technology sector -- Cyberattack scenarios in the information technology sector -- Nuclear reactors, materials, and waste sector -- Impact of a compromised nuclear reactor sector -- Cyberattack scenarios in the nuclear reactor sector -- Transportation system sector -- Impact of a compromised transportation system sector.
505 8 _aCyberattack scenarios in the transportation system sector -- Water and wastewater sector -- Impact of a compromised water and wastewater sector -- Cyberattack scenarios in the water and wastewater sector -- Summary -- References -- Chapter 2: The Growing Threat of Cyberattacks on Critical Infrastructure -- A brief history of CI protection and attacks -- The impact of the 9/11 attacks on CI -- Same old attacks throughout history -- Executive order 13010 -- Evolution of a nation's CI protection posture -- Evolution of cyberattacks and countermeasures -- The state of CI in the face of cyberattacks.
520 _aVenture through the core of cyber warfare and unveil the anatomy of cyberattacks on critical infrastructure Key Features Gain an overview of the fundamental principles of cybersecurity in critical infrastructure Explore real-world case studies that provide a more exciting learning experience, increasing retention Bridge the knowledge gap associated with IT/OT convergence through practical examples Purchase of the print or Kindle book includes a free PDF eBook Book Description Discover the core of cybersecurity through gripping real-world accounts of the most common assaults on critical infrastructure - the body of vital systems, networks, and assets so essential that their continued operation is required to ensure the security of a nation, its economy, and the public's health and safety - with this guide to understanding cybersecurity principles. From an introduction to critical infrastructure and cybersecurity concepts to the most common types of attacks, this book takes you through the life cycle of a vulnerability and how to assess and manage it. You'll study real-world cybersecurity breaches, each incident providing insights into the principles and practical lessons for cyber defenders striving to prevent future breaches. From DDoS to APTs, the book examines how each threat activates, operates, and succeeds. Additionally, you'll analyze the risks posed by computational paradigms, such as the advancement of AI and quantum computing, to legacy infrastructure. By the end of this book, you'll be able to identify key cybersecurity principles that can help mitigate evolving attacks to critical infrastructure. What you will learn Understand critical infrastructure and its importance to a nation Analyze the vulnerabilities in critical infrastructure systems Acquire knowledge of the most common types of cyberattacks on critical infrastructure Implement techniques and strategies for protecting critical infrastructure from cyber threats Develop technical insights into significant cyber attacks from the past decade Discover emerging trends and technologies that could impact critical infrastructure security Explore expert predictions about cyber threats and how they may evolve in the coming years Who this book is for This book is for SOC analysts, security analysts, operational technology (OT) engineers, and operators seeking to improve the cybersecurity posture of their networks. Knowledge of IT and OT systems, along with basic networking and system administration skills, will significantly enhance comprehension. An awareness of current cybersecurity trends, emerging technologies, and the legal framework surrounding critical infrastructure is beneficial.
650 0 _aCyberinfrastructure.
650 0 _aComputer security.
655 4 _aElectronic books.
856 _yFull text is available at ProQuest Ebook Central Click here to view
_uhttps://ebookcentral.proquest.com/lib/citph-ebooks/detail.action?docID=31317976
942 _2ddc
_cER