Buch, Englisch, 120 Seiten, Format (B × H): 156 mm x 234 mm
Buch, Englisch, 120 Seiten, Format (B × H): 156 mm x 234 mm
ISBN: 978-1-032-95531-5
Verlag: Taylor & Francis Ltd
This book will focus not only upon the two previous Supply Chain Attacks have recently happened, but it will also focus upon the Critical Infrastructure here in the United States. This includes the food supply chain, the water supply system the national power grid, and even the nuclear power facilities. Many of these establishments have been built with technology that was developed in the late 1960s and the early 1970s. Many of the vendors that built these technologies are now, for the most part, no longer in existence. Many of these are ICS and SCADA systems, and as a result, they also have many vulnerabilities from which a Cyberattacker can penetrate into a launch malicious payload, which will result in yet another form of a Cyber Supply Chain Attack.
Therefore, this book will focus upon the following:
*A Review Of the Critical Infrastructure of the United States
*A Review Of the Solar Winds Supply Chain Attack
*A Review As To How A Malicious Payload Can Created And Inserted, using SQL Injection Attacks as the primary example.
*A Critical Examination As To How Supply Chain Attacks Can Be Mitigated.
Zielgruppe
Professional Practice & Development, Professional Reference, and Professional Training
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Wirtschaftswissenschaften Volkswirtschaftslehre Wirtschaftssysteme, Wirtschaftsstrukturen
- Wirtschaftswissenschaften Volkswirtschaftslehre Wirtschaftspolitik, politische Ökonomie
- Sozialwissenschaften Politikwissenschaft Regierungspolitik Wirtschafts- und Finanzpolitik
- Geisteswissenschaften Architektur Gestaltung, Darstellung, Bautechnik
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Technische Wissenschaften Bauingenieurwesen Gebäudesicherheit
Weitere Infos & Material
Chapter 1: An Overview Into Cybersecurity Chapter 2: An Overview of Supply Chain Attacks & Critical Infrastructure Chapter 3: Real World Supply Chain Attacks Chapter 4: How To Mitigate The Risks of Supply Chain Attacks