Cyber-Physical Threat Intelligence for Critical Infrastructures Security : : A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures / / edited by John Soldatos, James Philpot, Gabriele Giunta.

Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rath...

Full description

Saved in:
Bibliographic Details
TeilnehmendeR:
Place / Publishing House:[Place of publication not identified] : : Now Publishers,, 2020.
©2020
Year of Publication:2020
Language:English
Physical Description:1 online resource (450 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993562037304498
ctrlnum (CKB)4920000001372427
(NjHacI)994920000001372427
(EXLCZ)994920000001372427
collection bib_alma
record_format marc
spelling Cyber-Physical Threat Intelligence for Critical Infrastructures Security : A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures / edited by John Soldatos, James Philpot, Gabriele Giunta.
Cyber-Physical Threat Intelligence for Critical Infrastructures Security
[Place of publication not identified] : Now Publishers, 2020.
©2020
1 online resource (450 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Description based on: online resource; title from PDF information screen (library.oapen.org, viewed February 16, 2023).
Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection.The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions.The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies.
Includes bibliographical references and index.
Computer security.
1-68083-687-0
Soldatos, John, editor.
Philpot, James, editor.
Giunta, Gabriele, editor.
language English
format eBook
author2 Soldatos, John,
Philpot, James,
Giunta, Gabriele,
author_facet Soldatos, John,
Philpot, James,
Giunta, Gabriele,
author2_variant j s js
j p jp
g g gg
author2_role TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
title Cyber-Physical Threat Intelligence for Critical Infrastructures Security : A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures /
spellingShingle Cyber-Physical Threat Intelligence for Critical Infrastructures Security : A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures /
title_sub A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures /
title_full Cyber-Physical Threat Intelligence for Critical Infrastructures Security : A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures / edited by John Soldatos, James Philpot, Gabriele Giunta.
title_fullStr Cyber-Physical Threat Intelligence for Critical Infrastructures Security : A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures / edited by John Soldatos, James Philpot, Gabriele Giunta.
title_full_unstemmed Cyber-Physical Threat Intelligence for Critical Infrastructures Security : A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures / edited by John Soldatos, James Philpot, Gabriele Giunta.
title_auth Cyber-Physical Threat Intelligence for Critical Infrastructures Security : A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures /
title_alt Cyber-Physical Threat Intelligence for Critical Infrastructures Security
title_new Cyber-Physical Threat Intelligence for Critical Infrastructures Security :
title_sort cyber-physical threat intelligence for critical infrastructures security : a guide to integrated cyber-physical protection of modern critical infrastructures /
publisher Now Publishers,
publishDate 2020
physical 1 online resource (450 pages)
isbn 1-68083-687-0
callnumber-first Q - Science
callnumber-subject QA - Mathematics
callnumber-label QA76
callnumber-sort QA 276.9 A25 C934 42020
illustrated Not Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
work_keys_str_mv AT soldatosjohn cyberphysicalthreatintelligenceforcriticalinfrastructuressecurityaguidetointegratedcyberphysicalprotectionofmoderncriticalinfrastructures
AT philpotjames cyberphysicalthreatintelligenceforcriticalinfrastructuressecurityaguidetointegratedcyberphysicalprotectionofmoderncriticalinfrastructures
AT giuntagabriele cyberphysicalthreatintelligenceforcriticalinfrastructuressecurityaguidetointegratedcyberphysicalprotectionofmoderncriticalinfrastructures
AT soldatosjohn cyberphysicalthreatintelligenceforcriticalinfrastructuressecurity
AT philpotjames cyberphysicalthreatintelligenceforcriticalinfrastructuressecurity
AT giuntagabriele cyberphysicalthreatintelligenceforcriticalinfrastructuressecurity
status_str n
ids_txt_mv (CKB)4920000001372427
(NjHacI)994920000001372427
(EXLCZ)994920000001372427
carrierType_str_mv cr
is_hierarchy_title Cyber-Physical Threat Intelligence for Critical Infrastructures Security : A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures /
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
_version_ 1764993842104238080
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03432nam a2200337 i 4500</leader><controlfield tag="001">993562037304498</controlfield><controlfield tag="005">20230217132252.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">230217s2020 xx ob 001 0 eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4920000001372427</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)994920000001372427</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994920000001372427</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">.C934 2020</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Cyber-Physical Threat Intelligence for Critical Infrastructures Security :</subfield><subfield code="b">A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures /</subfield><subfield code="c">edited by John Soldatos, James Philpot, Gabriele Giunta.</subfield></datafield><datafield tag="246" ind1=" " ind2=" "><subfield code="a">Cyber-Physical Threat Intelligence for Critical Infrastructures Security </subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified] :</subfield><subfield code="b">Now Publishers,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (450 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on: online resource; title from PDF information screen (library.oapen.org, viewed February 16, 2023).</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection.The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions.The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-68083-687-0</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Soldatos, John,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Philpot, James,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Giunta, Gabriele,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-03-01 00:35:34 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-09-22 08:09:39 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5337709260004498&amp;Force_direct=true</subfield><subfield code="Z">5337709260004498</subfield><subfield code="8">5337709260004498</subfield></datafield></record></collection>