Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Cyber-physical attack recovery procedures : a step-by-step preparation and response guide
Ayala L., Apress, New York, NY, 2016. 104 pp. Type: Book (978-1-484220-64-1)
Date Reviewed: Oct 31 2016

Hackers and antisocial elements use cyber-attacks as powerful weapons. A typical cyber-attack damages computing and information systems and thus disturbs the organization heavily. A cyber-physical attack is a type of cyber-attack through which a hacker damages building equipment using malware in a building control system (BCS). This causes more loss than a typical cyber-attack because a physical attack requires critical and time-consuming recovery procedures. With more and more web-enabled components from different vendors becoming part of the modern BCS, preventing cyber-physical attacks is becoming more challenging.

Certainly developing effect recovery procedures after a cyber-physical attack is one of the most important requirements for any organization. This book provides templates, frameworks, and general guidelines for effectively managing BCS and supervisory control and data acquisition (SCADA) systems.

The book has 12 chapters. The first two provide an overview and describe different types of cyber-physical attacks, while the last three chapters provide general guidelines and steps for preparing recovery procedures with suitable templates. Chapters 3 to 9 provide case studies for preventing hackers from destroying various critical components of the building such as boilers, pressure vessels, chillers, cooling towers, backup generators, and so on.

Ayala provides many practical guidelines and demonstrates his rich knowledge in managing BCSs against cyber-physical attacks. Whenever he uses jargon from electrical/mechanical/computer engineering fields, he provides proper explanations. This makes the book comprehensive and interesting.

In chapter 1, Ayala goes over and above providing a bird’s-eye view of cyber-physical attack recovery procedures by presenting an important attack called “cyber booby-trap” in a detailed way. He also touches upon other malware, namely, canary and honeypot. The block diagram provided at the end of chapter 1 on “recovery process mission critical systems” speaks to the depth and reality of the author’s approach. After presenting the specific case studies from chapters 3 to 9, Ayala provides a number of useful forms and checklists in the last three chapters, for the recovery process.

I am very impressed by the method of presentation, which again and again reflects the author’s rich experience in providing realistic solutions to practical problems. This is a must-read book for anyone who manages the cyber-security division of an organization, particularly those involving BCS and SCADA. This book will also be useful for conducting multidisciplinary research involving electrical, mechanical, civil, and computer engineers.

More reviews about this item: Amazon

Reviewer:  S. Ramakrishnan Review #: CR144888 (1702-0124)
Bookmark and Share
  Featured Reviewer  
 
Security and Protection (K.6.5 )
 
 
Real-Time And Embedded Systems (C.3 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy