Robust control system networks: how to achieve reliable control after Stuxnet
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York
Momentum Press
2012
|
Schlagworte: | |
Beschreibung: | Print version record |
Beschreibung: | 1 online resource (xiii, 206 pages) illustrations |
ISBN: | 9781606503027 1606503022 1283895617 9781283895613 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045349679 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2012 |||| o||u| ||||||eng d | ||
020 | |a 9781606503027 |9 978-1-60650-302-7 | ||
020 | |a 1606503022 |9 1-60650-302-2 | ||
020 | |a 1283895617 |9 1-283-89561-7 | ||
020 | |a 9781283895613 |9 978-1-283-89561-3 | ||
035 | |a (ZDB-4-ITC)ocn795808308 | ||
035 | |a (OCoLC)795808308 | ||
035 | |a (DE-599)BVBBV045349679 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 629.8 |2 23 | |
100 | 1 | |a Langner, Ralph |e Verfasser |4 aut | |
245 | 1 | 0 | |a Robust control system networks |b how to achieve reliable control after Stuxnet |c Ralph Langner |
264 | 1 | |a New York |b Momentum Press |c 2012 | |
300 | |a 1 online resource (xiii, 206 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
505 | 8 | |a The Stuxnet computer virus, originally discovered in July 2010, qualified as a turning point for control system security. While the malware did not cause destructive damage outside its designated target, it hit the Western world like the Sputnik shock. The sophistication and aggressiveness of this computer virus was at a level that few people had anticipated. It simply popped up without warning, after 10 years of silence following the first malicious amateur-style cyber attack on wastewater control systems in Australia. Compared to office IT malware as we know it, this would be like going from 1980s-style password guessing to botnets in one step. It was, indeed, shocking. Instead of a learning curve for both the attackers and the defenders that the general development and trend of malware had been experiencing in the IT world, there was one big leap. Even if they had wanted to, operators of potential targets in critical infrastructure and in the private sector were not able to perform a similar leap in defense and protection. Despite years, reaching back to the turn of the millennium, of efforts and investments in control system security, governmental programs and organizations, industry standards, workgroups, conferences, risk assessments, and mitigation projects, the industrialized nations continue to face a significant threat from post-Stuxnet malware for which they are by no means prepared | |
650 | 7 | |a TECHNOLOGY & ENGINEERING / Automation |2 bisacsh | |
650 | 7 | |a TECHNOLOGY & ENGINEERING / Robotics |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Robust control |2 fast | |
650 | 4 | |a Robust control |a Computer networks |x Security measures | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Langner, Ralph |t Robust control system networks |d New York : Momentum Press ; 2012 |z 9781606503003 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030736333 |
Datensatz im Suchindex
_version_ | 1804179173792546816 |
---|---|
any_adam_object | |
author | Langner, Ralph |
author_facet | Langner, Ralph |
author_role | aut |
author_sort | Langner, Ralph |
author_variant | r l rl |
building | Verbundindex |
bvnumber | BV045349679 |
collection | ZDB-4-ITC |
contents | The Stuxnet computer virus, originally discovered in July 2010, qualified as a turning point for control system security. While the malware did not cause destructive damage outside its designated target, it hit the Western world like the Sputnik shock. The sophistication and aggressiveness of this computer virus was at a level that few people had anticipated. It simply popped up without warning, after 10 years of silence following the first malicious amateur-style cyber attack on wastewater control systems in Australia. Compared to office IT malware as we know it, this would be like going from 1980s-style password guessing to botnets in one step. It was, indeed, shocking. Instead of a learning curve for both the attackers and the defenders that the general development and trend of malware had been experiencing in the IT world, there was one big leap. Even if they had wanted to, operators of potential targets in critical infrastructure and in the private sector were not able to perform a similar leap in defense and protection. Despite years, reaching back to the turn of the millennium, of efforts and investments in control system security, governmental programs and organizations, industry standards, workgroups, conferences, risk assessments, and mitigation projects, the industrialized nations continue to face a significant threat from post-Stuxnet malware for which they are by no means prepared |
ctrlnum | (ZDB-4-ITC)ocn795808308 (OCoLC)795808308 (DE-599)BVBBV045349679 |
dewey-full | 629.8 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 629 - Other branches of engineering |
dewey-raw | 629.8 |
dewey-search | 629.8 |
dewey-sort | 3629.8 |
dewey-tens | 620 - Engineering and allied operations |
discipline | Mess-/Steuerungs-/Regelungs-/Automatisierungstechnik / Mechatronik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02898nmm a2200409zc 4500</leader><controlfield tag="001">BV045349679</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781606503027</subfield><subfield code="9">978-1-60650-302-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1606503022</subfield><subfield code="9">1-60650-302-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1283895617</subfield><subfield code="9">1-283-89561-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781283895613</subfield><subfield code="9">978-1-283-89561-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn795808308</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)795808308</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045349679</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">629.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Langner, Ralph</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Robust control system networks</subfield><subfield code="b">how to achieve reliable control after Stuxnet</subfield><subfield code="c">Ralph Langner</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">Momentum Press</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xiii, 206 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The Stuxnet computer virus, originally discovered in July 2010, qualified as a turning point for control system security. While the malware did not cause destructive damage outside its designated target, it hit the Western world like the Sputnik shock. The sophistication and aggressiveness of this computer virus was at a level that few people had anticipated. It simply popped up without warning, after 10 years of silence following the first malicious amateur-style cyber attack on wastewater control systems in Australia. Compared to office IT malware as we know it, this would be like going from 1980s-style password guessing to botnets in one step. It was, indeed, shocking. Instead of a learning curve for both the attackers and the defenders that the general development and trend of malware had been experiencing in the IT world, there was one big leap. Even if they had wanted to, operators of potential targets in critical infrastructure and in the private sector were not able to perform a similar leap in defense and protection. Despite years, reaching back to the turn of the millennium, of efforts and investments in control system security, governmental programs and organizations, industry standards, workgroups, conferences, risk assessments, and mitigation projects, the industrialized nations continue to face a significant threat from post-Stuxnet malware for which they are by no means prepared</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Automation</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING / Robotics</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Robust control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Robust control</subfield><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Langner, Ralph</subfield><subfield code="t">Robust control system networks</subfield><subfield code="d">New York : Momentum Press ; 2012</subfield><subfield code="z">9781606503003</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030736333</subfield></datafield></record></collection> |
id | DE-604.BV045349679 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:40Z |
institution | BVB |
isbn | 9781606503027 1606503022 1283895617 9781283895613 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030736333 |
oclc_num | 795808308 |
open_access_boolean | |
physical | 1 online resource (xiii, 206 pages) illustrations |
psigel | ZDB-4-ITC |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Momentum Press |
record_format | marc |
spelling | Langner, Ralph Verfasser aut Robust control system networks how to achieve reliable control after Stuxnet Ralph Langner New York Momentum Press 2012 1 online resource (xiii, 206 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Print version record The Stuxnet computer virus, originally discovered in July 2010, qualified as a turning point for control system security. While the malware did not cause destructive damage outside its designated target, it hit the Western world like the Sputnik shock. The sophistication and aggressiveness of this computer virus was at a level that few people had anticipated. It simply popped up without warning, after 10 years of silence following the first malicious amateur-style cyber attack on wastewater control systems in Australia. Compared to office IT malware as we know it, this would be like going from 1980s-style password guessing to botnets in one step. It was, indeed, shocking. Instead of a learning curve for both the attackers and the defenders that the general development and trend of malware had been experiencing in the IT world, there was one big leap. Even if they had wanted to, operators of potential targets in critical infrastructure and in the private sector were not able to perform a similar leap in defense and protection. Despite years, reaching back to the turn of the millennium, of efforts and investments in control system security, governmental programs and organizations, industry standards, workgroups, conferences, risk assessments, and mitigation projects, the industrialized nations continue to face a significant threat from post-Stuxnet malware for which they are by no means prepared TECHNOLOGY & ENGINEERING / Automation bisacsh TECHNOLOGY & ENGINEERING / Robotics bisacsh Computer networks / Security measures fast Robust control fast Robust control Computer networks Security measures Erscheint auch als Druck-Ausgabe Langner, Ralph Robust control system networks New York : Momentum Press ; 2012 9781606503003 |
spellingShingle | Langner, Ralph Robust control system networks how to achieve reliable control after Stuxnet The Stuxnet computer virus, originally discovered in July 2010, qualified as a turning point for control system security. While the malware did not cause destructive damage outside its designated target, it hit the Western world like the Sputnik shock. The sophistication and aggressiveness of this computer virus was at a level that few people had anticipated. It simply popped up without warning, after 10 years of silence following the first malicious amateur-style cyber attack on wastewater control systems in Australia. Compared to office IT malware as we know it, this would be like going from 1980s-style password guessing to botnets in one step. It was, indeed, shocking. Instead of a learning curve for both the attackers and the defenders that the general development and trend of malware had been experiencing in the IT world, there was one big leap. Even if they had wanted to, operators of potential targets in critical infrastructure and in the private sector were not able to perform a similar leap in defense and protection. Despite years, reaching back to the turn of the millennium, of efforts and investments in control system security, governmental programs and organizations, industry standards, workgroups, conferences, risk assessments, and mitigation projects, the industrialized nations continue to face a significant threat from post-Stuxnet malware for which they are by no means prepared TECHNOLOGY & ENGINEERING / Automation bisacsh TECHNOLOGY & ENGINEERING / Robotics bisacsh Computer networks / Security measures fast Robust control fast Robust control Computer networks Security measures |
title | Robust control system networks how to achieve reliable control after Stuxnet |
title_auth | Robust control system networks how to achieve reliable control after Stuxnet |
title_exact_search | Robust control system networks how to achieve reliable control after Stuxnet |
title_full | Robust control system networks how to achieve reliable control after Stuxnet Ralph Langner |
title_fullStr | Robust control system networks how to achieve reliable control after Stuxnet Ralph Langner |
title_full_unstemmed | Robust control system networks how to achieve reliable control after Stuxnet Ralph Langner |
title_short | Robust control system networks |
title_sort | robust control system networks how to achieve reliable control after stuxnet |
title_sub | how to achieve reliable control after Stuxnet |
topic | TECHNOLOGY & ENGINEERING / Automation bisacsh TECHNOLOGY & ENGINEERING / Robotics bisacsh Computer networks / Security measures fast Robust control fast Robust control Computer networks Security measures |
topic_facet | TECHNOLOGY & ENGINEERING / Automation TECHNOLOGY & ENGINEERING / Robotics Computer networks / Security measures Robust control Robust control Computer networks Security measures |
work_keys_str_mv | AT langnerralph robustcontrolsystemnetworkshowtoachievereliablecontrolafterstuxnet |