Cybersecurity Lexicon

  • 4h 45m
  • Luis Ayala
  • Apress
  • 2016

Learn the threats and vulnerabilities of critical infrastructure to cybersecurity attack. Definitions are provided for cybersecurity technical terminology and hacker jargon related to automated control systems common to buildings, utilities, and industry.

Buildings today are automated because the systems are complicated and so we depend on the building controls system (BCS) to operate the equipment. We also depend on a computerized maintenance management system (CMMS) to keep a record of what was repaired and to schedule required maintenance. SCADA, BCS, and CMMS all can be hacked.

The Cybersecurity Lexicon puts cyber jargon related to building controls all in one place. The book is a handy desk reference for professionals interested in preventing cyber-physical attacks against their facilities in the real world.

Discussion of attacks on automated control systems is clouded by a lack of standard definitions and a general misunderstanding about how bad actors can actually employ cyber technology as a weapon in the real world. This book covers:

  • Concepts related to cyber-physical attacks and building hacks are listed alphabetically with text easily searchable by key phrase
  • Definitions are providesd for technical terms related to equipment controls common to industry, utilities, and buildings―much of the terminology also applies to cybersecurity in general

What You’ll learn

  • Get a simple explanation of cybersecurity attack concepts
  • Quickly assess the threat of the most common types of cybersecurity attacks to your facilities in real time
  • Find the definition of facilities, engineering, and cybersecurity acronyms

Who This Book Is For

Architects, engineers, building managers, students, researchers, and consultants interested in cybersecurity attacks against facilities in the real world. Also for IT professionals getting involved in cybersecurity responsibilities.

About the Author

Luis Ayala worked over 25 years for the Department of Defense with the past 11 years at the Defense Intelligence Agency. Prior to his appointment as a Defense Intelligence Senior Leader in 2008, he held several leadership positions at the Branch and Division levels.

His tenure culminated with the position as Senior Technical Expert (facilities/construction). Mr. Ayala earned his Bachelor of Architecture degree from Pratt Institute and he received his Master of Science and Technology Intelligence from the National Intelligence University. NIU is the Intelligence Community’s sole accredited, federal degree granting institution. His Master’s thesis titled “Cybersecure Facilities for the Intelligence Community” is classified. Mr. Ayala was awarded the DIA Civilian Expeditionary Medal and the Civilian Combat Support Medal.

In this Book

  • #: 2-Pipe HVAC (Heating, Ventilating, Air Conditioning) System—4 -Pipe HVAC System
  • A: ABC Fire Extinguisher—Ayala Scale (Cyber-Physical Attack Severity Levels)
  • B: Baby Monitor Hacks—Byzantine Failure Hack
  • C: Cache—Cyclic Redundancy Check (CRC)
  • D: Daemon—Dynamic Routing Protocol
  • E: Easter Eggs—Extranet
  • F: Facilities—Fuzzing Attack
  • G: Gas Utility Flow Meter—Guessing Entropy
  • H: Hack Attack Map—Hypervisor
  • I: IA Architecture—IT Security Architecture
  • J: Jailbreaking—Just A Bunch of Disks (JBOD)
  • K: Kerberos—Kinetic Cyber-Attack
  • L: Laboratory Attack—Luser Attitude Readjustment Tool (LART)
  • M: Machine Controller—Multi-Platform
  • N: Nanonetwork—Numerical Control (NC)
  • O: Obfuscated Spam—Owner
  • P: Packet—Pwnium
  • Q: Quadrant—Quarantine
  • R: Rackmount—Rupture Disc
  • S: S-box—System Security Plan (SSP)
  • T: Tabletop Exercise—Type Certification
  • U: US Person—Utility Monitoring and Control System (UMCS) Network
  • V: %VOL—Vulnerability Testing
  • W: Wall Wart—Write-Blocker
  • X, Y: X.509 Certificate—XOR Engine
  • Z: ZeroAccess Attack—Zone of Control
  • Facilities, Engineering, and Cyber Acronyms
  • Cyber Standards
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.6 of 419 users Rating 4.6 of 419 users (419)
Rating 4.6 of 22 users Rating 4.6 of 22 users (22)
Rating 4.6 of 5 users Rating 4.6 of 5 users (5)