Robust control system networks: how to achieve reliable control after Stuxnet
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York
Momentum Press
c2012
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Includes bibliographical references (p. 187-188) and index 1. Introduction: the three faces of risk -- 1.1. The insurance model of risk: risk as statistical probability and projected amount of loss -- 1.2. The logical model of risk: risk as cause and consequence -- 1.3. The financial model of risk: risk as volatility -- 1.4. From risk to fragility and from security to robustness -- The Stuxnet computer virus, originally discovered in July 2010, qualified as a turning point for control system security. While the malware did not cause destructive damage outside its designated target, it hit the Western world like the Sputnik shock. The sophistication and aggressiveness of this computer virus was at a level that few people had anticipated. It simply popped up without warning, after 10 years of silence following the first malicious amateur-style cyber attack on wastewater control systems in Australia. Compared to office IT malware as we know it, this would be like going from 1980s-style password guessing to botnets in one step. It was, indeed, shocking. Instead of a learning curve for both the attackers and the defenders that the general development and trend of malware had been experiencing in the IT world, there was one big leap. Even if they had wanted to, operators of potential targets in critical infrastructure and in the private sector were not able to perform a similar leap in defense and protection. Despite years, reaching back to the turn of the millennium, of efforts and investments in control system security, governmental programs and organizations, industry standards, workgroups, conferences, risk assessments, and mitigation projects, the industrialized nations continue to face a significant threat from post-Stuxnet malware for which they are by no means prepared |
Beschreibung: | 1 Online-Ressource (xiii, 206 p.) |
ISBN: | 1283895617 1606503006 1606503022 9781283895613 9781606503003 9781606503027 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043096512 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2012 |||| o||u| ||||||eng d | ||
020 | |a 1283895617 |9 1-283-89561-7 | ||
020 | |a 1606503006 |9 1-60650-300-6 | ||
020 | |a 1606503022 |c electronic bk. |9 1-60650-302-2 | ||
020 | |a 9781283895613 |9 978-1-283-89561-3 | ||
020 | |a 9781606503003 |9 978-1-60650-300-3 | ||
020 | |a 9781606503027 |c electronic bk. |9 978-1-60650-302-7 | ||
035 | |a (OCoLC)795808308 | ||
035 | |a (DE-599)BVBBV043096512 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 629.8 |2 23 | |
100 | 1 | |a Langner, Ralph |e Verfasser |4 aut | |
245 | 1 | 0 | |a Robust control system networks |b how to achieve reliable control after Stuxnet |c Ralph Langner |
264 | 1 | |a New York |b Momentum Press |c c2012 | |
300 | |a 1 Online-Ressource (xiii, 206 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references (p. 187-188) and index | ||
500 | |a 1. Introduction: the three faces of risk -- 1.1. The insurance model of risk: risk as statistical probability and projected amount of loss -- 1.2. The logical model of risk: risk as cause and consequence -- 1.3. The financial model of risk: risk as volatility -- 1.4. From risk to fragility and from security to robustness -- | ||
500 | |a The Stuxnet computer virus, originally discovered in July 2010, qualified as a turning point for control system security. While the malware did not cause destructive damage outside its designated target, it hit the Western world like the Sputnik shock. The sophistication and aggressiveness of this computer virus was at a level that few people had anticipated. It simply popped up without warning, after 10 years of silence following the first malicious amateur-style cyber attack on wastewater control systems in Australia. Compared to office IT malware as we know it, this would be like going from 1980s-style password guessing to botnets in one step. It was, indeed, shocking. Instead of a learning curve for both the attackers and the defenders that the general development and trend of malware had been experiencing in the IT world, there was one big leap. Even if they had wanted to, operators of potential targets in critical infrastructure and in the private sector were not able to perform a similar leap in defense and protection. Despite years, reaching back to the turn of the millennium, of efforts and investments in control system security, governmental programs and organizations, industry standards, workgroups, conferences, risk assessments, and mitigation projects, the industrialized nations continue to face a significant threat from post-Stuxnet malware for which they are by no means prepared | ||
650 | 7 | |a TECHNOLOGY & ENGINEERING / Automation |2 bisacsh | |
650 | 7 | |a TECHNOLOGY & ENGINEERING / Robotics |2 bisacsh | |
650 | 7 | |a Robust control |2 local | |
650 | 7 | |a Computer networks / Security measures |2 local | |
650 | 4 | |a Automatic Control | |
650 | 4 | |a Computer Networks | |
650 | 4 | |a Robust control | |
650 | 4 | |a Computer networks |x Security measures | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028520704 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175502235140096 |
---|---|
any_adam_object | |
author | Langner, Ralph |
author_facet | Langner, Ralph |
author_role | aut |
author_sort | Langner, Ralph |
author_variant | r l rl |
building | Verbundindex |
bvnumber | BV043096512 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)795808308 (DE-599)BVBBV043096512 |
dewey-full | 629.8 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 629 - Other branches of engineering |
dewey-raw | 629.8 |
dewey-search | 629.8 |
dewey-sort | 3629.8 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Mess-/Steuerungs-/Regelungs-/Automatisierungstechnik / Mechatronik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03763nmm a2200505zc 4500</leader><controlfield tag="001">BV043096512</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1283895617</subfield><subfield code="9">1-283-89561-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1606503006</subfield><subfield code="9">1-60650-300-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1606503022</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-60650-302-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781283895613</subfield><subfield code="9">978-1-283-89561-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781606503003</subfield><subfield code="9">978-1-60650-300-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781606503027</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-60650-302-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)795808308</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043096512</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">629.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Langner, Ralph</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Robust control system networks</subfield><subfield code="b">how to achieve reliable control after Stuxnet</subfield><subfield code="c">Ralph Langner</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">Momentum Press</subfield><subfield code="c">c2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiii, 206 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 187-188) and index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">1. Introduction: the three faces of risk -- 1.1. The insurance model of risk: risk as statistical probability and projected amount of loss -- 1.2. The logical model of risk: risk as cause and consequence -- 1.3. The financial model of risk: risk as volatility -- 1.4. From risk to fragility and from security to robustness --</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">The Stuxnet computer virus, originally discovered in July 2010, qualified as a turning point for control system security. While the malware did not cause destructive damage outside its designated target, it hit the Western world like the Sputnik shock. The sophistication and aggressiveness of this computer virus was at a level that few people had anticipated. It simply popped up without warning, after 10 years of silence following the first malicious amateur-style cyber attack on wastewater control systems in Australia. Compared to office IT malware as we know it, this would be like going from 1980s-style password guessing to botnets in one step. It was, indeed, shocking. Instead of a learning curve for both the attackers and the defenders that the general development and trend of malware had been experiencing in the IT world, there was one big leap. Even if they had wanted to, operators of potential targets in critical infrastructure and in the private sector were not able to perform a similar leap in defense and protection. Despite years, reaching back to the turn of the millennium, of efforts and investments in control system security, governmental programs and organizations, industry standards, workgroups, conferences, risk assessments, and mitigation projects, the industrialized nations continue to face a significant threat from post-Stuxnet malware for which they are by no means prepared</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Automation</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Robotics</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Robust control</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">local</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Automatic Control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Robust control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028520704</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043096512 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:17:18Z |
institution | BVB |
isbn | 1283895617 1606503006 1606503022 9781283895613 9781606503003 9781606503027 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028520704 |
oclc_num | 795808308 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xiii, 206 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Momentum Press |
record_format | marc |
spelling | Langner, Ralph Verfasser aut Robust control system networks how to achieve reliable control after Stuxnet Ralph Langner New York Momentum Press c2012 1 Online-Ressource (xiii, 206 p.) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references (p. 187-188) and index 1. Introduction: the three faces of risk -- 1.1. The insurance model of risk: risk as statistical probability and projected amount of loss -- 1.2. The logical model of risk: risk as cause and consequence -- 1.3. The financial model of risk: risk as volatility -- 1.4. From risk to fragility and from security to robustness -- The Stuxnet computer virus, originally discovered in July 2010, qualified as a turning point for control system security. While the malware did not cause destructive damage outside its designated target, it hit the Western world like the Sputnik shock. The sophistication and aggressiveness of this computer virus was at a level that few people had anticipated. It simply popped up without warning, after 10 years of silence following the first malicious amateur-style cyber attack on wastewater control systems in Australia. Compared to office IT malware as we know it, this would be like going from 1980s-style password guessing to botnets in one step. It was, indeed, shocking. Instead of a learning curve for both the attackers and the defenders that the general development and trend of malware had been experiencing in the IT world, there was one big leap. Even if they had wanted to, operators of potential targets in critical infrastructure and in the private sector were not able to perform a similar leap in defense and protection. Despite years, reaching back to the turn of the millennium, of efforts and investments in control system security, governmental programs and organizations, industry standards, workgroups, conferences, risk assessments, and mitigation projects, the industrialized nations continue to face a significant threat from post-Stuxnet malware for which they are by no means prepared TECHNOLOGY & ENGINEERING / Automation bisacsh TECHNOLOGY & ENGINEERING / Robotics bisacsh Robust control local Computer networks / Security measures local Automatic Control Computer Networks Robust control Computer networks Security measures http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116 Aggregator Volltext |
spellingShingle | Langner, Ralph Robust control system networks how to achieve reliable control after Stuxnet TECHNOLOGY & ENGINEERING / Automation bisacsh TECHNOLOGY & ENGINEERING / Robotics bisacsh Robust control local Computer networks / Security measures local Automatic Control Computer Networks Robust control Computer networks Security measures |
title | Robust control system networks how to achieve reliable control after Stuxnet |
title_auth | Robust control system networks how to achieve reliable control after Stuxnet |
title_exact_search | Robust control system networks how to achieve reliable control after Stuxnet |
title_full | Robust control system networks how to achieve reliable control after Stuxnet Ralph Langner |
title_fullStr | Robust control system networks how to achieve reliable control after Stuxnet Ralph Langner |
title_full_unstemmed | Robust control system networks how to achieve reliable control after Stuxnet Ralph Langner |
title_short | Robust control system networks |
title_sort | robust control system networks how to achieve reliable control after stuxnet |
title_sub | how to achieve reliable control after Stuxnet |
topic | TECHNOLOGY & ENGINEERING / Automation bisacsh TECHNOLOGY & ENGINEERING / Robotics bisacsh Robust control local Computer networks / Security measures local Automatic Control Computer Networks Robust control Computer networks Security measures |
topic_facet | TECHNOLOGY & ENGINEERING / Automation TECHNOLOGY & ENGINEERING / Robotics Robust control Computer networks / Security measures Automatic Control Computer Networks Computer networks Security measures |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=501116 |
work_keys_str_mv | AT langnerralph robustcontrolsystemnetworkshowtoachievereliablecontrolafterstuxnet |