Learn the threats and vulnerabilities of critical infrastructure to cybersecurity attack. Definitions are provided for cybersecurity technical terminology and hacker jargon related to automated control systems common to buildings, utilities, and industry.
Buildings today are automated because the systems are complicated and so we depend on the building controls system (BCS) to operate the equipment. We also depend on a computerized maintenance management system (CMMS) to keep a record of what was repaired and to schedule required maintenance. SCADA, BCS, and CMMS all can be hacked....
Learn the threats and vulnerabilities of critical infrastructure to cybersecurity attack. Definitions are provided for cybersecurity technical term...
This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause building equipment to act erratically or fail completely. When hackers shut off the water, turn off the building power, disable the sewage effluent pumps and activate the fire alarm, you have to do something quick. It is even more alarming that hackers can do all those things at the same time--even from the other side of the planet.
Not every equipment failure or power outage is a cyber-physical attack. When your building is attacked, you...
This book provides a template with step-by-step instructions on how to respond and recover when hackers get into your SCADA system and cause buildi...
Before spending $100,000 preparing your next design/build proposal, read this book. Written by someone that has sat on many selection boards. Other design/build books only talk about how to perform after you win the contract. This book tells you HOW TO GET SELECTED for the contract and avoid having your proposal tossed on the Bad Pile. The book offers authoritative insight and explains why the DESIGN is so important in your proposal for industry, government and nonprofit clients. The author makes the argument that the best design - a truly GREAT design - can't lose. But, who defines what's...
Before spending $100,000 preparing your next design/build proposal, read this book. Written by someone that has sat on many selection boards. Other de...
Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support equipment on which lives depend.
News reports inform us how hackers strike hospitals with ransomware that prevents staff from accessing patient records or scheduling appointments. Unfortunately, medical equipment also can be hacked and shut down...
Learn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipm...