Cybersecurity Lexicon

This book offers easy-to-understand definitions of cybersecurity technical terminology and hacker jargon related to automated control systems common to buildings, utilities, and industry, and explains the threats and vulnerabilities of critical infrastructure. Although written primarily for building...

Full description

Main Author: Ayala, Luis. (Author, http://id.loc.gov/vocabulary/relators/aut)
Corporate Author: SpringerLink (Online service)
Language:English
Published: Berkeley, CA : Apress : Imprint: Apress, 2016.
Edition:1st ed. 2016.
Subjects:
Online Access:https://doi.org/10.1007/978-1-4842-2068-9
LEADER 03945nam a22004935i 4500
001 978-1-4842-2068-9
003 DE-He213
005 20210620061225.0
007 cr nn 008mamaa
008 160621s2016 xxu| s |||| 0|eng d
020 |a 9781484220689  |9 978-1-4842-2068-9 
024 7 |a 10.1007/978-1-4842-2068-9  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
082 0 4 |a 005.8  |2 23 
100 1 |a Ayala, Luis.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Cybersecurity Lexicon  |h [electronic resource] /  |c by Luis Ayala. 
250 |a 1st ed. 2016. 
264 1 |a Berkeley, CA :  |b Apress :  |b Imprint: Apress,  |c 2016. 
300 |a XI, 200 p. 1 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Chapter 1: # -- Chapter 2: A -- Chapter 3: B -- Chapter 4: C -- Chapter 5: D -- Chapter 6: E -- Chapter 7: F -- Chapter 8: G -- Chapter 9: H -- Chapter 10: I -- Chapter 11: J -- Chapter 12: K -- Chapter 13: L -- Chapter 14: M -- Chapter 15: N -- Chapter 16: O -- Chapter 17: P -- Chapter 18: Q -- Chapter 19: R -- Chapter 20: S -- Chapter 21: T -- Chapter 22: U -- Chapter 23: V -- Chapter 24: W -- Chapter 25: X -- Chapter 26: Y -- Chapter 27: Z -- Chapter 28: Facilities, Engineering, and Cyber Acronyms -- Chapter 29: Cyber Standards. 
520 |a This book offers easy-to-understand definitions of cybersecurity technical terminology and hacker jargon related to automated control systems common to buildings, utilities, and industry, and explains the threats and vulnerabilities of critical infrastructure. Although written primarily for building designers and maintenance personnel, much of the terminology applies to cyber-physical attacks in general. Buildings today are automated because the systems are complicated so we depend on the building controls system (BCS) to operate the equipment. We also depend on a computerized maintenance management system (CMMS) to keep a record of what was repaired and to schedule required maintenance. SCADA, BCS, and CMMS can all be hacked. The Cybersecurity Lexicon puts cyber jargon related to building controls all in one place. The book is a handy desk reference for professionals interested in preventing cyber-physical attacks against their facilities in the real world. Discussion of cybers-physical attacks on automated control systems is clouded by a lack of standard definitions and a general misunderstanding about how bad actors can actually employ cyber technology as a weapon in the real world. The book provides: Concepts related to cyber-physical attacks and building hacks are listed alphabetically with text easily searchable by key phrase. Definitions of technical terms related to equipment controls common to industry, utilities, and buildings—much of the terminology also applies to cybersecurity in general. . 
650 0 |a Data protection. 
650 0 |a Computer security. 
650 0 |a Building repair. 
650 0 |a Buildings—Repair and reconstruction. 
650 1 4 |a Security.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28000 
650 2 4 |a Systems and Data Security.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060 
650 2 4 |a Building Repair and Maintenance.  |0 https://scigraph.springernature.com/ontologies/product-market-codes/T23055 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9781484220672 
776 0 8 |i Printed edition:  |z 9781484220696 
856 4 0 |u https://doi.org/10.1007/978-1-4842-2068-9 
912 |a ZDB-2-CWD 
912 |a ZDB-2-SXPC 
950 |a Professional and Applied Computing (SpringerNature-12059) 
950 |a Professional and Applied Computing (R0) (SpringerNature-43716)