Cyber Security of Critical Infrastructures

Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable...

Full description

Saved in:
Bibliographic Details
HerausgeberIn:
Sonstige:
Year of Publication:2021
Language:English
Physical Description:1 electronic resource (316 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993545689504498
ctrlnum (CKB)5400000000042513
(oapen)https://directory.doabooks.org/handle/20.500.12854/77132
(EXLCZ)995400000000042513
collection bib_alma
record_format marc
spelling Maglaras, Leandros edt
Cyber Security of Critical Infrastructures
Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute 2021
1 electronic resource (316 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods.
English
Technology: general issues bicssc
crypto-ransomware
locker-ransomware
static analysis
dynamic analysis
machine learning
assessment framework
cybersecurity
GDPR
PCI-DSS
DSPT
NISD
cyber-ranges
security training
security modelling
serious games
dynamic adaptation
training programmes
computers in education
bloom
STRIDE
smart shipping
military
VMF
hash chain
T-OTP
lightweight secure hash (LSH)
CNR
web application
security vulnerability
analysis security testing
static analysis security testing
dynamic analysis security testing
interactive analysis security testing
assessment methodology
false positive
false negative
tools combination
deep learning
image classification
transfer learning
industrial control system
fine-tuning
testbeds
cyber ranges
cyber exercises
education
training
research
lattice cryptography
code cryptography
post quantum cryptography
physical unclonable function
public key infrastructure
high performance computing
malware analysis
static malware analysis
dynamic malware analysis
malware classification
random forest
support vector machines
smart grid
risk assessment
threat modeling
formal verification
probabilistic model checking
cloud robotics
image face recognition
deep learning algorithms
security
encryption algorithms
cybercrime
Hasse diagram
interval-valued complex intuitionistic fuzzy relations
interval-valued complex intuitionistic fuzzy sets
offensive cybersecurity
cyber-attacks
scoring model
offensive cybersecurity framework
3-0365-2726-5
3-0365-2727-3
Kantzavelou, Ioanna edt
Ferrag, Mohamed Amine edt
Maglaras, Leandros oth
Kantzavelou, Ioanna oth
Ferrag, Mohamed Amine oth
language English
format eBook
author2 Kantzavelou, Ioanna
Ferrag, Mohamed Amine
Maglaras, Leandros
Kantzavelou, Ioanna
Ferrag, Mohamed Amine
author_facet Kantzavelou, Ioanna
Ferrag, Mohamed Amine
Maglaras, Leandros
Kantzavelou, Ioanna
Ferrag, Mohamed Amine
author2_variant l m lm
i k ik
m a f ma maf
author2_role HerausgeberIn
HerausgeberIn
Sonstige
Sonstige
Sonstige
title Cyber Security of Critical Infrastructures
spellingShingle Cyber Security of Critical Infrastructures
title_full Cyber Security of Critical Infrastructures
title_fullStr Cyber Security of Critical Infrastructures
title_full_unstemmed Cyber Security of Critical Infrastructures
title_auth Cyber Security of Critical Infrastructures
title_new Cyber Security of Critical Infrastructures
title_sort cyber security of critical infrastructures
publisher MDPI - Multidisciplinary Digital Publishing Institute
publishDate 2021
physical 1 electronic resource (316 p.)
isbn 3-0365-2726-5
3-0365-2727-3
illustrated Not Illustrated
work_keys_str_mv AT maglarasleandros cybersecurityofcriticalinfrastructures
AT kantzavelouioanna cybersecurityofcriticalinfrastructures
AT ferragmohamedamine cybersecurityofcriticalinfrastructures
status_str n
ids_txt_mv (CKB)5400000000042513
(oapen)https://directory.doabooks.org/handle/20.500.12854/77132
(EXLCZ)995400000000042513
carrierType_str_mv cr
is_hierarchy_title Cyber Security of Critical Infrastructures
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
_version_ 1796652228918902785
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05404nam-a2201273z--4500</leader><controlfield tag="001">993545689504498</controlfield><controlfield tag="005">20231214133439.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr|mn|---annan</controlfield><controlfield tag="008">202201s2021 xx |||||o ||| 0|eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5400000000042513</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(oapen)https://directory.doabooks.org/handle/20.500.12854/77132</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995400000000042513</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Maglaras, Leandros</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber Security of Critical Infrastructures</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Basel, Switzerland</subfield><subfield code="b">MDPI - Multidisciplinary Digital Publishing Institute</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 electronic resource (316 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Technology: general issues</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">crypto-ransomware</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">locker-ransomware</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">static analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">dynamic analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">machine learning</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">assessment framework</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cybersecurity</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">GDPR</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">PCI-DSS</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">DSPT</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">NISD</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber-ranges</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">security training</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">security modelling</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">serious games</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">dynamic adaptation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">training programmes</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">computers in education</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">bloom</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">STRIDE</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">smart shipping</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">military</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">VMF</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">hash chain</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">T-OTP</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">lightweight secure hash (LSH)</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">CNR</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">web application</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">security vulnerability</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">analysis security testing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">static analysis security testing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">dynamic analysis security testing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">interactive analysis security testing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">assessment methodology</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">false positive</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">false negative</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">tools combination</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">deep learning</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">image classification</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">transfer learning</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">industrial control system</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">fine-tuning</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">testbeds</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber ranges</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber exercises</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">education</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">training</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">research</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">lattice cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">code cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">post quantum cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">physical unclonable function</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">public key infrastructure</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">high performance computing</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">malware analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">static malware analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">dynamic malware analysis</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">malware classification</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">random forest</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">support vector machines</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">smart grid</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">risk assessment</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">threat modeling</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">formal verification</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">probabilistic model checking</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cloud robotics</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">image face recognition</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">deep learning algorithms</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">encryption algorithms</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cybercrime</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hasse diagram</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">interval-valued complex intuitionistic fuzzy relations</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">interval-valued complex intuitionistic fuzzy sets</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">offensive cybersecurity</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">cyber-attacks</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">scoring model</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">offensive cybersecurity framework</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-0365-2726-5</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">3-0365-2727-3</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kantzavelou, Ioanna</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ferrag, Mohamed Amine</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Maglaras, Leandros</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kantzavelou, Ioanna</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ferrag, Mohamed Amine</subfield><subfield code="4">oth</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-12-15 05:54:17 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-04-04 09:22:53 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5337969410004498&amp;Force_direct=true</subfield><subfield code="Z">5337969410004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337969410004498</subfield></datafield></record></collection>