Cyber Security of Critical Infrastructures
Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable...
Saved in:
HerausgeberIn: | |
---|---|
Sonstige: | |
Year of Publication: | 2021 |
Language: | English |
Physical Description: | 1 electronic resource (316 p.) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993545689504498 |
---|---|
ctrlnum |
(CKB)5400000000042513 (oapen)https://directory.doabooks.org/handle/20.500.12854/77132 (EXLCZ)995400000000042513 |
collection |
bib_alma |
record_format |
marc |
spelling |
Maglaras, Leandros edt Cyber Security of Critical Infrastructures Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute 2021 1 electronic resource (316 p.) text txt rdacontent computer c rdamedia online resource cr rdacarrier Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods. English Technology: general issues bicssc crypto-ransomware locker-ransomware static analysis dynamic analysis machine learning assessment framework cybersecurity GDPR PCI-DSS DSPT NISD cyber-ranges security training security modelling serious games dynamic adaptation training programmes computers in education bloom STRIDE smart shipping military VMF hash chain T-OTP lightweight secure hash (LSH) CNR web application security vulnerability analysis security testing static analysis security testing dynamic analysis security testing interactive analysis security testing assessment methodology false positive false negative tools combination deep learning image classification transfer learning industrial control system fine-tuning testbeds cyber ranges cyber exercises education training research lattice cryptography code cryptography post quantum cryptography physical unclonable function public key infrastructure high performance computing malware analysis static malware analysis dynamic malware analysis malware classification random forest support vector machines smart grid risk assessment threat modeling formal verification probabilistic model checking cloud robotics image face recognition deep learning algorithms security encryption algorithms cybercrime Hasse diagram interval-valued complex intuitionistic fuzzy relations interval-valued complex intuitionistic fuzzy sets offensive cybersecurity cyber-attacks scoring model offensive cybersecurity framework 3-0365-2726-5 3-0365-2727-3 Kantzavelou, Ioanna edt Ferrag, Mohamed Amine edt Maglaras, Leandros oth Kantzavelou, Ioanna oth Ferrag, Mohamed Amine oth |
language |
English |
format |
eBook |
author2 |
Kantzavelou, Ioanna Ferrag, Mohamed Amine Maglaras, Leandros Kantzavelou, Ioanna Ferrag, Mohamed Amine |
author_facet |
Kantzavelou, Ioanna Ferrag, Mohamed Amine Maglaras, Leandros Kantzavelou, Ioanna Ferrag, Mohamed Amine |
author2_variant |
l m lm i k ik m a f ma maf |
author2_role |
HerausgeberIn HerausgeberIn Sonstige Sonstige Sonstige |
title |
Cyber Security of Critical Infrastructures |
spellingShingle |
Cyber Security of Critical Infrastructures |
title_full |
Cyber Security of Critical Infrastructures |
title_fullStr |
Cyber Security of Critical Infrastructures |
title_full_unstemmed |
Cyber Security of Critical Infrastructures |
title_auth |
Cyber Security of Critical Infrastructures |
title_new |
Cyber Security of Critical Infrastructures |
title_sort |
cyber security of critical infrastructures |
publisher |
MDPI - Multidisciplinary Digital Publishing Institute |
publishDate |
2021 |
physical |
1 electronic resource (316 p.) |
isbn |
3-0365-2726-5 3-0365-2727-3 |
illustrated |
Not Illustrated |
work_keys_str_mv |
AT maglarasleandros cybersecurityofcriticalinfrastructures AT kantzavelouioanna cybersecurityofcriticalinfrastructures AT ferragmohamedamine cybersecurityofcriticalinfrastructures |
status_str |
n |
ids_txt_mv |
(CKB)5400000000042513 (oapen)https://directory.doabooks.org/handle/20.500.12854/77132 (EXLCZ)995400000000042513 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Cyber Security of Critical Infrastructures |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField noLinkedField noLinkedField |
_version_ |
1796652228918902785 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05404nam-a2201273z--4500</leader><controlfield tag="001">993545689504498</controlfield><controlfield tag="005">20231214133439.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr|mn|---annan</controlfield><controlfield tag="008">202201s2021 xx |||||o ||| 0|eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5400000000042513</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/77132</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995400000000042513</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Maglaras, Leandros</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber Security of Critical Infrastructures</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Basel, Switzerland</subfield><subfield code="b">MDPI - Multidisciplinary Digital Publishing Institute</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 electronic resource (316 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Technology: general issues</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">crypto-ransomware</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">locker-ransomware</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">static analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">dynamic analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">machine learning</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">assessment framework</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cybersecurity</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">GDPR</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">PCI-DSS</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">DSPT</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">NISD</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber-ranges</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">security training</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">security modelling</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">serious games</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">dynamic adaptation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">training programmes</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">computers in education</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">bloom</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">STRIDE</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">smart shipping</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">military</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">VMF</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">hash chain</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">T-OTP</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">lightweight secure hash (LSH)</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">CNR</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">web application</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">security vulnerability</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">analysis security testing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">static analysis security testing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">dynamic analysis security testing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">interactive analysis security testing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">assessment methodology</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">false positive</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">false negative</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">tools combination</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">deep learning</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">image classification</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">transfer learning</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">industrial control system</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">fine-tuning</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">testbeds</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber ranges</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber exercises</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">education</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">training</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">research</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">lattice cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">code cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">post quantum cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">physical unclonable function</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">public key infrastructure</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">high performance computing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">malware analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">static malware analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">dynamic malware analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">malware classification</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">random forest</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">support vector machines</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">smart grid</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">risk assessment</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">threat modeling</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">formal verification</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">probabilistic model checking</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cloud robotics</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">image face recognition</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">deep learning algorithms</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">encryption algorithms</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cybercrime</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hasse diagram</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">interval-valued complex intuitionistic fuzzy relations</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">interval-valued complex intuitionistic fuzzy sets</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">offensive cybersecurity</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber-attacks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">scoring model</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">offensive cybersecurity framework</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-0365-2726-5</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-0365-2727-3</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kantzavelou, Ioanna</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ferrag, Mohamed Amine</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Maglaras, Leandros</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kantzavelou, Ioanna</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ferrag, Mohamed Amine</subfield><subfield code="4">oth</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-12-15 05:54:17 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-04-04 09:22:53 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5337969410004498&Force_direct=true</subfield><subfield code="Z">5337969410004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337969410004498</subfield></datafield></record></collection> |