• Complain

Ayala - Cybersecurity Lexicon

Here you can read online Ayala - Cybersecurity Lexicon full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Berkeley;CA;New York, year: 2016, publisher: Apress, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Ayala Cybersecurity Lexicon
  • Book:
    Cybersecurity Lexicon
  • Author:
  • Publisher:
    Apress
  • Genre:
  • Year:
    2016
  • City:
    Berkeley;CA;New York
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Cybersecurity Lexicon: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Cybersecurity Lexicon" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Chapter 1: # -- Chapter 2: A -- Chapter 3: B -- Chapter 4: C -- Chapter 5: D -- Chapter 6: E -- Chapter 7: F -- Chapter 8: G -- Chapter 9: H -- Chapter 10: I -- Chapter 11: J -- Chapter 12: K -- Chapter 13: L -- Chapter 14: M -- Chapter 15: N -- Chapter 16: O -- Chapter 17: P -- Chapter 18: Q -- Chapter 19: R -- Chapter 20: S -- Chapter 21: T -- Chapter 22: U -- Chapter 23: V -- Chapter 24: W -- Chapter 25: X -- Chapter 26: Y -- Chapter 27: Z -- Chapter 28: Facilities, Engineering, and Cyber Acronyms -- Chapter 29: Cyber Standards.;This book offers easy-to-understand definitions of cybersecurity technical terminology and hacker jargon related to automated control systems common to buildings, utilities, and industry, and explains the threats and vulnerabilities of critical infrastructure. Although written primarily for building designers and maintenance personnel, much of the terminology applies to cyber-physical attacks in general. Buildings today are automated because the systems are complicated so we depend on the building controls system (BCS) to operate the equipment. We also depend on a computerized maintenance management system (CMMS) to keep a record of what was repaired and to schedule required maintenance. SCADA, BCS, and CMMS can all be hacked. The Cybersecurity Lexicon puts cyber jargon related to building controls all in one place. The book is a handy desk reference for professionals interested in preventing cyber-physical attacks against their facilities in the real world. Discussion of cybers-physical attacks on automated control systems is clouded by a lack of standard definitions and a general misunderstanding about how bad actors can actually employ cyber technology as a weapon in the real world. The book provides: Concepts related to cyber-physical attacks and building hacks are listed alphabetically with text easily searchable by key phrase. Definitions of technical terms related to equipment controls common to industry, utilities, and buildings--much of the terminology also applies to cybersecurity in general. .

Ayala: author's other books


Who wrote Cybersecurity Lexicon? Find out the surname, the name of the author of the book and a list of all author's works by series.

Cybersecurity Lexicon — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Cybersecurity Lexicon" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Luis Ayala 2016
Luis Ayala Cybersecurity Lexicon 10.1007/978-1-4842-2068-9_1
1. #
Luis Ayala 1
(1)
Fredericksburg, USA
- pipe HVAC (heating, ventilating, air conditioning) system : A two-pipe system consists of fan coil units with single coils connected to two pipes. The two pipes, one supply and one return, are connected to supply lines in the buildings mechanical room. Supply lines can supply hot water or chilled water. Two pipe systems are less flexible than a four-pipe system because the entire building is in either heating mode or cooling mode.
3-level password protection : Requiring an additional password to authorize critical operations greatly reduces the surface area to attack the secondary credentials since they are used less often; for example, a power-on password, a parameter-setting password, and a parameter correction password. Requiring reauthentication to perform special actions can protect against CSRF (cross-site request forgery) attacks. Cross-site request forgery is also known as one-click attack or session riding .
3D laser scanning system : A very precise system that captures 3D shapes on an assembly line to inspect, measure, and collect data of real-world objects.
4 -pipe HVAC system : A four-pipe system includes the distribution system that consists of a hot water supply with return lines and a chilled water supply with return lines. Four-pipe systems can supply heat to one room while simultaneously cooling another room. A four-pipe HVAC system can be hacked so the building heat and cooling systems are on at the same time, working against each otherdriving up energy costs.
Luis Ayala 2016
Luis Ayala Cybersecurity Lexicon 10.1007/978-1-4842-2068-9_2
2. A
Luis Ayala 1
(1)
Fredericksburg, USA
ABC fire extinguisher : Chemically-based fire extinguishing device used to put out ordinary combustible, flammable liquid and electrical fires.
Abnormal Situation Management (ASM) : ASM was developed with the goal of improving safety and performance in process plants. Over the past 20 years, the ASM Consortium has developed knowledge, tools, and products designed to prevent and manage abnormal situations in the process industry. This knowledge is directly applicable to cyber-physical attack response.
abort gate : A high-speed damper designed to divert sparks, flames, smoke, combustion gases, and burning material out of a pneumatic system and evacuate the air through a discharge hood. An abort gate contains a spring-assisted blade that is usually held in place by an electromagnet that typically will react within 1/2 second. Used to protect dust collection systems and prevent dust explosions. If an attacker hacks a dust collection systems abort gate at an industrial facility to prevent it from doing its job, there is a high probability of a dust explosion.
absolute encoder : Maintains equipment position information when power is lost from a manufacturing environment. Once power is restored, the position information is immediately available.
acceptable level of risk : Typically refers to the point at which the level of risk is more acceptable than the cost to mitigate the risk (in dollars or effect on building mission function).
access : (1) The technical ability to do something with a computer resource. This usually refers to ability to read, create, modify, or delete a file; execute a program; or use an external connection, admission, or entrance. (2) The ability or opportunity to obtain sensitive or classified information. SOURCE: CNSSI-4009
access control : The limiting of access to the resources of an IT (information technology) system only to authorized users, programs, processes, or other IT systems. SOURCE: FIPS 201; CNSSI-4009
access control list (ACL) : A list of permissions that specifies which users or system processes are granted access to objects. Each entry specifies a subject and an operation (Joe: write, read, Sam: read only). SOURCE: CNSSI-4009
Access Matrix : An Access Matrix uses rows to represent subjects and columns to represent objects with privileges listed in each cell.
access point : A device that logically connects wireless client devices operating in infrastructure to one another and provides access to a distribution system, if connected, which is typically an organizations enterprise wired network. SOURCE: SP 800-48; SP 800-121
access profile : The association of a user with a list of protected objects that the user may access. SOURCE: CNSSI-4009
access type : The privilege to perform action on an object. Read, write, execute, append, modify, delete, and create are examples of access types. SOURCE: CNSSI-4009
account harvesting attack : The process of collecting all the user account names on a computer network. Often used to refer to computer spammers, individuals who try to sell or seduce others through e-mail advertising or solicitation. Account harvesting involves using computer programs to search areas on the Internet in order to gather lists of e-mail addresses from a number of sources, including chat rooms, domain names, instant message users, message boards, newsgroups, online directories for web pages, web pages, and other online destinations.
account management : Involves the process of requesting, establishing, issuing, and closing user accounts; tracking users and their respective access authorizations; and managing these functions. SOURCE: SP 800-12
accountability : The property that enables activities on a system to be traced to individuals, who may then be held responsible for their actions. The security goal that generates the requirement for actions of an entity to be traced uniquely to that entity. This supports non-repudiation, deterrence, fault isolation, intrusion detection and prevention, and after-action recovery and legal action. SOURCE: SP 800-27
ACK : In some digital communications protocols, notification that a signal has been received successfully. The ACK signal is sent by the receiving station after receipt of data. When the source gets an ACK signal, it transmits the next block of data.
ACK piggybacking attack : Is an active form of wiretapping when a hacker sends an ACK inside another packet to the same destination.
active cyber-attack : An intentional cyber-attack perpetrated that attempts to alter a SCADA (supervisory control and data acquisition) system, its resources, its data, or its operations. SOURCE: CNSSI-4009
active attack : An attack on the authentication protocol where the attacker transmits data to the claimant, credential service provider, verifier, or relying party. Examples of active attacks include man-in-the-middle, impersonation, and session hijacking. SOURCE: SP 800-63
active content : Electronic documents that can carry out or trigger actions automatically on a computer platform without the intervention of a user. Software in various forms that is able to automatically carry out or trigger actions on a computer platform without the intervention of a user. SOURCE: SP 800-28, CNSSI-4009
activation : When all or a portion of the cyber-physical attack recovery plan has been put into motion.
active security testing : Security testing that involves direct interaction with a target, such as sending packets to a target. SOURCE: SP 800-115
activities : An assessment object that includes specific protection-related pursuits or actions supporting an information system that involve people (e.g., conducting system backup operations, monitoring network traffic). SOURCE: SP 800-53A
activity monitor : Used to prevent a cyber-attack by monitoring a system and blocking malicious activity. A system monitor for an operating system, which also incorporates task manager functionality. Some of the functions include killing computer processes, viewing CPU load, checking the amount of random access memory in use, and other functions.
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Cybersecurity Lexicon»

Look at similar books to Cybersecurity Lexicon. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Cybersecurity Lexicon»

Discussion, reviews of the book Cybersecurity Lexicon and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.