Cyber-Physical Threat Intelligence for Critical Infrastructures Security : : Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry / / John Soldatos, Isabel Praça, Aleksandar Jovanović.
Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries between physical security and cybersecurity are blurred. Emerging systems for Cri...
Saved in:
VerfasserIn: | |
---|---|
TeilnehmendeR: | |
Place / Publishing House: | Norwell, MA : : Now Publishers,, 2021. |
Year of Publication: | 2021 |
Language: | English |
Series: | NowOpen Series
|
Physical Description: | 1 online resource (xlv, 557 pages). |
Notes: | Includes index. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993562106504498 |
---|---|
ctrlnum |
(CKB)4920000001372684 (NjHacI)994920000001372684 (EXLCZ)994920000001372684 |
collection |
bib_alma |
record_format |
marc |
spelling |
Soldatos, John, author. Cyber-Physical Threat Intelligence for Critical Infrastructures Security : Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry / John Soldatos, Isabel Praça, Aleksandar Jovanović. Cyber-Physical Threat Intelligence for Critical Infrastructures Security Norwell, MA : Now Publishers, 2021. 1 online resource (xlv, 557 pages). text txt rdacontent computer c rdamedia online resource cr rdacarrier NowOpen Series Description based on publisher supplied metadata and other sources. Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries between physical security and cybersecurity are blurred. Emerging systems for Critical Infrastructures Security and Protection must therefore consider integrated approaches that emphasize the interplay between cybersecurity and physical security techniques. Hence, there is a need for a new type of integrated security intelligence i.e., Cyber-Physical Threat Intelligence (CPTI).This book presents novel solutions for integrated Cyber-Physical Threat Intelligence for infrastructures in various sectors, such as Industrial Sites and Plants, Air Transport, Gas, Healthcare, and Finance. The solutions rely on novel methods and technologies, such as integrated modelling for cyber-physical systems, novel reliance indicators, and data driven approaches including BigData analytics and Artificial Intelligence (AI). Some of the presented approaches are sector agnostic i.e., applicable to different sectors with a fair customization effort. Nevertheless, the book presents also peculiar challenges of specific sectors and how they can be addressed. The presented solutions consider the European policy context for Security, Cyber security, and Critical Infrastructure protection, as laid out by the European Commission (EC) to support its Member States to protect and ensure the resilience of their critical infrastructures. Most of the co-authors and contributors are from European Research and Technology Organizations, as well as from European Critical Infrastructure Operators. Hence, the presented solutions respect the European approach to CIP, as reflected in the pillars of the European policy framework. The latter includes for example the Directive on security of network and information systems (NIS Directive), the Directive on protecting European Critical Infrastructures, the General Data Protection Regulation (GDPR), and the Cybersecurity Act Regulation. The sector specific solutions that are described in the book have been developed and validated in the scope of several European Commission (EC) co-funded projects on Critical Infrastructure Protection (CIP), which focus on the listed sectors.Overall, the book illustrates a rich set of systems, technologies, and applications that critical infrastructure operators could consult to shape their future strategies. It also provides a catalogue of CPTI case studies in different sectors, which could be useful for security consultants and practitioners as well. Includes index. English. Cyber intelligence (Computer security) Infrastructure (Economics) Security measures. 1-68083-823-7 Praça, Isabel, author. Jovanović, Aleksandar, author. |
language |
English |
format |
eBook |
author |
Soldatos, John, Praça, Isabel, Jovanović, Aleksandar, |
spellingShingle |
Soldatos, John, Praça, Isabel, Jovanović, Aleksandar, Cyber-Physical Threat Intelligence for Critical Infrastructures Security : Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry / NowOpen Series |
author_facet |
Soldatos, John, Praça, Isabel, Jovanović, Aleksandar, Praça, Isabel, Jovanović, Aleksandar, |
author_variant |
j s js i p ip a j aj |
author_role |
VerfasserIn VerfasserIn VerfasserIn |
author2 |
Praça, Isabel, Jovanović, Aleksandar, |
author2_role |
TeilnehmendeR TeilnehmendeR |
author_sort |
Soldatos, John, |
title |
Cyber-Physical Threat Intelligence for Critical Infrastructures Security : Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry / |
title_sub |
Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry / |
title_full |
Cyber-Physical Threat Intelligence for Critical Infrastructures Security : Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry / John Soldatos, Isabel Praça, Aleksandar Jovanović. |
title_fullStr |
Cyber-Physical Threat Intelligence for Critical Infrastructures Security : Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry / John Soldatos, Isabel Praça, Aleksandar Jovanović. |
title_full_unstemmed |
Cyber-Physical Threat Intelligence for Critical Infrastructures Security : Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry / John Soldatos, Isabel Praça, Aleksandar Jovanović. |
title_auth |
Cyber-Physical Threat Intelligence for Critical Infrastructures Security : Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry / |
title_alt |
Cyber-Physical Threat Intelligence for Critical Infrastructures Security |
title_new |
Cyber-Physical Threat Intelligence for Critical Infrastructures Security : |
title_sort |
cyber-physical threat intelligence for critical infrastructures security : securing critical infrastructures in air transport, water, gas, healthcare, finance and industry / |
series |
NowOpen Series |
series2 |
NowOpen Series |
publisher |
Now Publishers, |
publishDate |
2021 |
physical |
1 online resource (xlv, 557 pages). |
isbn |
1-68083-823-7 |
callnumber-first |
Q - Science |
callnumber-subject |
QA - Mathematics |
callnumber-label |
QA76 |
callnumber-sort |
QA 276.9 A25 S653 42021 |
illustrated |
Not Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
work_keys_str_mv |
AT soldatosjohn cyberphysicalthreatintelligenceforcriticalinfrastructuressecuritysecuringcriticalinfrastructuresinairtransportwatergashealthcarefinanceandindustry AT pracaisabel cyberphysicalthreatintelligenceforcriticalinfrastructuressecuritysecuringcriticalinfrastructuresinairtransportwatergashealthcarefinanceandindustry AT jovanovicaleksandar cyberphysicalthreatintelligenceforcriticalinfrastructuressecuritysecuringcriticalinfrastructuresinairtransportwatergashealthcarefinanceandindustry AT soldatosjohn cyberphysicalthreatintelligenceforcriticalinfrastructuressecurity AT pracaisabel cyberphysicalthreatintelligenceforcriticalinfrastructuressecurity AT jovanovicaleksandar cyberphysicalthreatintelligenceforcriticalinfrastructuressecurity |
status_str |
n |
ids_txt_mv |
(CKB)4920000001372684 (NjHacI)994920000001372684 (EXLCZ)994920000001372684 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Cyber-Physical Threat Intelligence for Critical Infrastructures Security : Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry / |
author2_original_writing_str_mv |
noLinkedField noLinkedField |
_version_ |
1764985591734206464 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03953nam a2200349 i 4500</leader><controlfield tag="001">993562106504498</controlfield><controlfield tag="005">20230225113649.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">230225s2021 mau o 001 0 eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)4920000001372684</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)994920000001372684</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)994920000001372684</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">.S653 2021</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Soldatos, John,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber-Physical Threat Intelligence for Critical Infrastructures Security :</subfield><subfield code="b">Securing Critical Infrastructures in Air Transport, Water, Gas, Healthcare, Finance and Industry /</subfield><subfield code="c">John Soldatos, Isabel Praça, Aleksandar Jovanović.</subfield></datafield><datafield tag="246" ind1=" " ind2=" "><subfield code="a">Cyber-Physical Threat Intelligence for Critical Infrastructures Security </subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Norwell, MA :</subfield><subfield code="b">Now Publishers,</subfield><subfield code="c">2021.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xlv, 557 pages).</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">NowOpen Series</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Modern critical infrastructures can be considered as large scale Cyber Physical Systems (CPS). Therefore, when designing, implementing, and operating systems for Critical Infrastructure Protection (CIP), the boundaries between physical security and cybersecurity are blurred. Emerging systems for Critical Infrastructures Security and Protection must therefore consider integrated approaches that emphasize the interplay between cybersecurity and physical security techniques. Hence, there is a need for a new type of integrated security intelligence i.e., Cyber-Physical Threat Intelligence (CPTI).This book presents novel solutions for integrated Cyber-Physical Threat Intelligence for infrastructures in various sectors, such as Industrial Sites and Plants, Air Transport, Gas, Healthcare, and Finance. The solutions rely on novel methods and technologies, such as integrated modelling for cyber-physical systems, novel reliance indicators, and data driven approaches including BigData analytics and Artificial Intelligence (AI). Some of the presented approaches are sector agnostic i.e., applicable to different sectors with a fair customization effort. Nevertheless, the book presents also peculiar challenges of specific sectors and how they can be addressed. The presented solutions consider the European policy context for Security, Cyber security, and Critical Infrastructure protection, as laid out by the European Commission (EC) to support its Member States to protect and ensure the resilience of their critical infrastructures. Most of the co-authors and contributors are from European Research and Technology Organizations, as well as from European Critical Infrastructure Operators. Hence, the presented solutions respect the European approach to CIP, as reflected in the pillars of the European policy framework. The latter includes for example the Directive on security of network and information systems (NIS Directive), the Directive on protecting European Critical Infrastructures, the General Data Protection Regulation (GDPR), and the Cybersecurity Act Regulation. The sector specific solutions that are described in the book have been developed and validated in the scope of several European Commission (EC) co-funded projects on Critical Infrastructure Protection (CIP), which focus on the listed sectors.Overall, the book illustrates a rich set of systems, technologies, and applications that critical infrastructure operators could consult to shape their future strategies. It also provides a catalogue of CPTI case studies in different sectors, which could be useful for security consultants and practitioners as well.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Infrastructure (Economics)</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-68083-823-7</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Praça, Isabel,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jovanović, Aleksandar,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-03-01 01:53:45 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2022-09-22 08:09:39 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5337798300004498&Force_direct=true</subfield><subfield code="Z">5337798300004498</subfield><subfield code="8">5337798300004498</subfield></datafield></record></collection> |