www.pdhonline.com - Your Gateway to Lifelong Learning   |   Email: PDHonline@Gmail.com   
 
Current
Price
Course
Number
PDH Online Course Description PDH Units/
Learning Units (Hours)
Buy
Course
Take
Quiz
$29

Buy Now

View Course

View or Take Quiz

add_to_cart

save_for_later
G572
Cybersecurity Terms that Every Engineer Should Know

Dale Wuokko, P.E.

Information technology and networked operational technology systems are increasingly under cyberattack. In May 2017 the malicious “WannaCrypt” (also known as “WannaCry”) malware targeting Microsoft Windows operating systems spread across the globe. This cyberattack encrypted data in infected computers preventing users from accessing their data unless they paid a ransom to the perpetrators using Bitcoin to obtain the decryption key. Earlier in March Microsoft had issued a security update to patch this vulnerability. However, many computers remained unpatched and, as a result, hospitals, businesses, governments, and computers at homes were affected. This included unpatched software at engineering firms and suppliers.

As the Internet-of-Things continues to expand so will cyberattacks. These cyberattacks have the potential to adversely impact critical infrastructure which includes systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on the Nation’s security, public health, safety, or economy, or any combination of those matters. The design, operation and maintenance of critical infrastructure is addressed by many engineering disciplines, including civil, electrical, mechanical, industrial, hydrological, environmental, computer, and others. Tunnels serving as the primary conduit for transportation, water, electric communications, and natural gas lines; bridges; dams; water treatment plants; electric power generating plants; supply lines bringing power, communications, food, and water to a community; and hospitals are all examples of critical infrastructure.

In the face of the increasing growth of cyberattacks, it is imperative that today’s engineers have a good understand¬ing of key cybersecurity terms and definitions. This course provides the engineering community with a reference of key cybersecurity terms and definitions.

This course includes a multiple-choice quiz at the end, which is designed to enhance the understanding of the course materials.


View Course Content

NY PE & PLS: You must choose courses that are technical in nature or related to matters of laws and ethics contributing to the health and welfare of the public. NY Board does not accept courses related to office management, risk management, leadership, marketing, accounting, financial planning, real estate, and basic CAD. Specific course topics that are on the borderline and are not acceptable by the NY Board have been noted under the course description on our website.

AIA Members: You must take the courses listed under the category "AIA/CES Registered Courses" if you want us to report your Learning Units (LUs) to AIA/CES. If you take courses not registered with AIA/CES, you need to report the earned Learning Units (not qualified for HSW credits) using Self Report Form provided by AIA/CES.

1