Part III Cyber Operations for Infrastructure Attack

In this part, we discuss how cyber operations can be used to attack infrastructure. Unlike the cyber attacks presented in the first part of the book, which were focused on computer systems, the cyber operations described on the following pages were designed to cause damage in the physical world. We start out by introducing the class of systems affected by these operations—industrial control systems (ICS) in Chapter 11 featuring the case study of the Maroochy Water Breach—an incident where an Australian water treatment facility was attacked and manipulated using cyber means. This is followed by a discussion of the possibility of cyber attacks against power grids in Chapter 12. There, we describe ...

Get Introduction to Cyber-Warfare now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.