Cyber-Physical Threat Intelligence for Critical Infrastructures Security : : A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures / / edited by John Soldatos, James Philpot, Gabriele Giunta.
Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rath...
Saved in:
TeilnehmendeR: | |
---|---|
Place / Publishing House: | [Place of publication not identified] : : Now Publishers,, 2020. ©2020 |
Year of Publication: | 2020 |
Language: | English |
Physical Description: | 1 online resource (450 pages) |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993562037304498 |
---|---|
ctrlnum |
(CKB)4920000001372427 (NjHacI)994920000001372427 (EXLCZ)994920000001372427 |
collection |
bib_alma |
record_format |
marc |
spelling |
Cyber-Physical Threat Intelligence for Critical Infrastructures Security : A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures / edited by John Soldatos, James Philpot, Gabriele Giunta. Cyber-Physical Threat Intelligence for Critical Infrastructures Security [Place of publication not identified] : Now Publishers, 2020. ©2020 1 online resource (450 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Description based on: online resource; title from PDF information screen (library.oapen.org, viewed February 16, 2023). Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection.The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions.The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies. Includes bibliographical references and index. Computer security. 1-68083-687-0 Soldatos, John, editor. Philpot, James, editor. Giunta, Gabriele, editor. |
language |
English |
format |
eBook |
author2 |
Soldatos, John, Philpot, James, Giunta, Gabriele, |
author_facet |
Soldatos, John, Philpot, James, Giunta, Gabriele, |
author2_variant |
j s js j p jp g g gg |
author2_role |
TeilnehmendeR TeilnehmendeR TeilnehmendeR |
title |
Cyber-Physical Threat Intelligence for Critical Infrastructures Security : A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures / |
spellingShingle |
Cyber-Physical Threat Intelligence for Critical Infrastructures Security : A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures / |
title_sub |
A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures / |
title_full |
Cyber-Physical Threat Intelligence for Critical Infrastructures Security : A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures / edited by John Soldatos, James Philpot, Gabriele Giunta. |
title_fullStr |
Cyber-Physical Threat Intelligence for Critical Infrastructures Security : A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures / edited by John Soldatos, James Philpot, Gabriele Giunta. |
title_full_unstemmed |
Cyber-Physical Threat Intelligence for Critical Infrastructures Security : A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures / edited by John Soldatos, James Philpot, Gabriele Giunta. |
title_auth |
Cyber-Physical Threat Intelligence for Critical Infrastructures Security : A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures / |
title_alt |
Cyber-Physical Threat Intelligence for Critical Infrastructures Security |
title_new |
Cyber-Physical Threat Intelligence for Critical Infrastructures Security : |
title_sort |
cyber-physical threat intelligence for critical infrastructures security : a guide to integrated cyber-physical protection of modern critical infrastructures / |
publisher |
Now Publishers, |
publishDate |
2020 |
physical |
1 online resource (450 pages) |
isbn |
1-68083-687-0 |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.9 A25 C934 42020 |
illustrated |
Not Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
work_keys_str_mv |
AT soldatosjohn cyberphysicalthreatintelligenceforcriticalinfrastructuressecurityaguidetointegratedcyberphysicalprotectionofmoderncriticalinfrastructures AT philpotjames cyberphysicalthreatintelligenceforcriticalinfrastructuressecurityaguidetointegratedcyberphysicalprotectionofmoderncriticalinfrastructures AT giuntagabriele cyberphysicalthreatintelligenceforcriticalinfrastructuressecurityaguidetointegratedcyberphysicalprotectionofmoderncriticalinfrastructures AT soldatosjohn cyberphysicalthreatintelligenceforcriticalinfrastructuressecurity AT philpotjames cyberphysicalthreatintelligenceforcriticalinfrastructuressecurity AT giuntagabriele cyberphysicalthreatintelligenceforcriticalinfrastructuressecurity |
status_str |
n |
ids_txt_mv |
(CKB)4920000001372427 (NjHacI)994920000001372427 (EXLCZ)994920000001372427 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Cyber-Physical Threat Intelligence for Critical Infrastructures Security : A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures / |
author2_original_writing_str_mv |
noLinkedField noLinkedField noLinkedField |
_version_ |
1764993842104238080 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03432nam a2200337 i 4500</leader><controlfield tag="001">993562037304498</controlfield><controlfield tag="005">20230217132252.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">230217s2020 xx ob 001 0 eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4920000001372427</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)994920000001372427</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994920000001372427</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">.C934 2020</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Cyber-Physical Threat Intelligence for Critical Infrastructures Security :</subfield><subfield code="b">A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures /</subfield><subfield code="c">edited by John Soldatos, James Philpot, Gabriele Giunta.</subfield></datafield><datafield tag="246" ind1=" " ind2=" "><subfield code="a">Cyber-Physical Threat Intelligence for Critical Infrastructures Security </subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified] :</subfield><subfield code="b">Now Publishers,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (450 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on: online resource; title from PDF information screen (library.oapen.org, viewed February 16, 2023).</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection.The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions.The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-68083-687-0</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Soldatos, John,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Philpot, James,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Giunta, Gabriele,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-03-01 00:35:34 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-09-22 08:09:39 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5337709260004498&Force_direct=true</subfield><subfield code="Z">5337709260004498</subfield><subfield code="8">5337709260004498</subfield></datafield></record></collection> |