Cyber-physical threat intelligence for critical infrastructures security : : a guide to integrated cyber-physical protection of modern critical infrastructures / / John Soldatos.

Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rath...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
Place / Publishing House:Hanover, Massachusetts : : Now Publishers,, [2020]
©2020
Year of Publication:2020
Language:English
Physical Description:1 online resource (xliii, 456 pages) :; illustrations
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 05432nam a2200313 i 4500
001 993603117004498
005 20230515205454.0
006 m o d
007 cr |||||||||||
008 230515s2020 maua o 000 0 eng d
035 |a (CKB)5470000000566737 
035 |a (NjHacI)995470000000566737 
035 |a (EXLCZ)995470000000566737 
040 |a NjHacI  |b eng  |e rda  |c NjHacl 
050 4 |a TK5105.59  |b .S653 2020 
082 0 4 |a 005.8  |2 23 
100 1 |a Soldatos, John,  |e author. 
245 1 0 |a Cyber-physical threat intelligence for critical infrastructures security :  |b a guide to integrated cyber-physical protection of modern critical infrastructures /  |c John Soldatos. 
246 |a Cyber-Physical Threat Intelligence for Critical Infrastructures Security  
264 1 |a Hanover, Massachusetts :  |b Now Publishers,  |c [2020] 
264 4 |c ©2020 
300 |a 1 online resource (xliii, 456 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 |a Description based on publisher supplied metadata and other sources. 
520 |a Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection.The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions.The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies. 
505 0 |a Preface -- Part I: Securing Critical Infrastructures of the Financial Sector -- Security Challenges for the Critical Infrastructures of the Financial Sector -- A Reference Architecture for Securing Infrastructures in the Finance Sector -- FINSTIX: A Security Knowledge Base for the Finance Sector -- Artificial Intelligence Gateway for Cyber-Physical Security in Critical Infrastructure and Finance -- Information Sharing and Stakeholders' Collaboration for Stronger Security in Financial Sector Supply Chains: A Blockchain Approach -- Automated Assistance to the Security Assessment of APIs for Financial Services -- Adaptive and Intelligent Data Collection for Security of Critical Financial Infrastructures and Services -- Part II: Securing Critical Infrastructures of the Health Sector -- Security Challenges for the Critical Infrastructures of the Healthcare Sector -- Security Systems in the Healthcare Sector -- Integrated Cyber-Physical Security Approach for Healthcare Sector -- Vulnerability and incident propagation in cyber-physical systems -- Innovative Toolkit to Assess and Mitigate Cyber Threats in the Healthcare Sector -- Part III: Securing Critical Infrastructures of the Energy Sector -- Security Challenges for the Critical Infrastructures of the Energy Sector -- Securing CEI by-designSecuring CEI by-innovation -- Part IV: Securing Critical Infrastructures of the Communications Sector -- Security and Resilience Challenges for the Critical Infrastructures of the Communications Sector -- Resilience enhancement and risk control Platform for Communication Infrastructure Operators -- Managed Security on 5G communication networks: the Software Defined Security paradigm -- Part V: Sector Agnostic Issues in Critical Infrastructures Protection -- Detection of innovative low-rate denial of service attacks against critical infrastructures -- Resilience analysis and quantification for Critical Infrastructures -- CISIApro Critical Infrastructures Modelling technique for an effective Decision Making Support -- Modern innovative detectors of physical threats for Critical Infrastructures -- The Ethical Aspects of Critical Infrastructure Protection. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Cyber intelligence (Computer security) 
776 |z 1-68083-686-2 
906 |a BOOK 
ADM |b 2023-06-09 08:19:03 Europe/Vienna  |f System  |c marc21  |a 2021-06-12 22:12:12 Europe/Vienna  |g false 
AVE |i DOAB Directory of Open Access Books  |P DOAB Directory of Open Access Books  |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5337709260004498&Force_direct=true  |Z 5337709260004498  |b Available  |8 5337709260004498