Skip to main content

Threats and Attack Detection

  • Chapter
  • First Online:
Cyber-Physical Attack Recovery Procedures
  • 1103 Accesses

Abstract

When developing strategies for Recovery Procedures, it is helpful to consider the entire range of possible and probable cyber-physical attack vectors that present a risk to an organization. From that range of threats, likely scenarios can be developed and appropriate strategies applied. Any Recovery Procedures should be designed to be flexible enough to respond to extended building interruptions, as well as major natural disasters.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    While a terrorist may want to cause a boiler to explode, he would have to know a great deal about the particular installation to be able to pull it off. It’s low probability because a script kiddie can’t do it.

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Luis Ayala

About this chapter

Cite this chapter

Ayala, L. (2016). Threats and Attack Detection. In: Cyber-Physical Attack Recovery Procedures. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4842-2065-8_2

Download citation

Publish with us

Policies and ethics