Das | The Effects of Cyber Supply Chain Attacks and Mitigation Strategies | Buch | 978-1-032-95531-5 | sack.de

Buch, Englisch, 120 Seiten, Format (B × H): 156 mm x 234 mm

Das

The Effects of Cyber Supply Chain Attacks and Mitigation Strategies

Buch, Englisch, 120 Seiten, Format (B × H): 156 mm x 234 mm

ISBN: 978-1-032-95531-5
Verlag: Taylor & Francis Ltd


The world about a week ago witnessed what is probably the largest Cyber Supply Chain Attack ever known to humankind. The magnitude of this attack only merely underscores the sheer level of interconnectivity that exists today. Because of this, the chances of this happening many more times is very high. For instance, all it takes is just one weakness, vulnerability, or a backdoor for the Cyberattacker to exploit, and from there, deploy the malicious payload which will then be sent to thousands of victims worldwide.

This book will focus not only upon the two previous Supply Chain Attacks have recently happened, but it will also focus upon the Critical Infrastructure here in the United States. This includes the food supply chain, the water supply system the national power grid, and even the nuclear power facilities. Many of these establishments have been built with technology that was developed in the late 1960s and the early 1970s. Many of the vendors that built these technologies are now, for the most part, no longer in existence. Many of these are ICS and SCADA systems, and as a result, they also have many vulnerabilities from which a Cyberattacker can penetrate into a launch malicious payload, which will result in yet another form of a Cyber Supply Chain Attack.

Therefore, this book will focus upon the following:

*A Review Of the Critical Infrastructure of the United States

*A Review Of the Solar Winds Supply Chain Attack

*A Review As To How A Malicious Payload Can Created And Inserted, using SQL Injection Attacks as the primary example.

*A Critical Examination As To How Supply Chain Attacks Can Be Mitigated.
Das The Effects of Cyber Supply Chain Attacks and Mitigation Strategies jetzt bestellen!

Zielgruppe


Professional Practice & Development, Professional Reference, and Professional Training


Autoren/Hrsg.


Weitere Infos & Material


Chapter 1:  An Overview Into Cybersecurity Chapter 2:  An Overview of Supply Chain Attacks & Critical Infrastructure Chapter 3:  Real World Supply Chain Attacks Chapter 4:  How To Mitigate The Risks of Supply Chain Attacks


I am currently a Cyber Technical Engineering Writer for a large IT Services Provider. I also do Cybersecurity Consulting through my private practice, ML Tech, Inc. I also hold the Certified In Cybersecurity Certification from the ISC(2).

I have published 18 books through CRC Press. I have recently signed a contract for a 19th book manuscript.


Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.




Das könnte Sie auch interessieren