Abstract
When developing strategies for Recovery Procedures, it is helpful to consider the entire range of possible and probable cyber-physical attack vectors that present a risk to an organization. From that range of threats, likely scenarios can be developed and appropriate strategies applied. Any Recovery Procedures should be designed to be flexible enough to respond to extended building interruptions, as well as major natural disasters.
Keywords
- Cyber-physical Attacks
- Major Natural Disasters
- Recovery Procedure
- Attack Vectors
- Foreign Security Services (FSS)
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
While a terrorist may want to cause a boiler to explode, he would have to know a great deal about the particular installation to be able to pull it off. It’s low probability because a script kiddie can’t do it.
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2016 Luis Ayala
About this chapter
Cite this chapter
Ayala, L. (2016). Threats and Attack Detection. In: Cyber-Physical Attack Recovery Procedures. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2065-8_2
Download citation
DOI: https://doi.org/10.1007/978-1-4842-2065-8_2
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4842-2064-1
Online ISBN: 978-1-4842-2065-8
eBook Packages: Professional and Applied ComputingProfessional and Applied Computing (R0)Apress Access Books