Cyber-physical threat intelligence for critical infrastructures security : : a guide to integrated cyber-physical protection of modern critical infrastructures / / John Soldatos.
Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rath...
Saved in:
VerfasserIn: | |
---|---|
Place / Publishing House: | Hanover, Massachusetts : : Now Publishers,, [2020] ©2020 |
Year of Publication: | 2020 |
Language: | English |
Physical Description: | 1 online resource (xliii, 456 pages) :; illustrations |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993603117004498 |
---|---|
ctrlnum |
(CKB)5470000000566737 (NjHacI)995470000000566737 (EXLCZ)995470000000566737 |
collection |
bib_alma |
record_format |
marc |
spelling |
Soldatos, John, author. Cyber-physical threat intelligence for critical infrastructures security : a guide to integrated cyber-physical protection of modern critical infrastructures / John Soldatos. Cyber-Physical Threat Intelligence for Critical Infrastructures Security Hanover, Massachusetts : Now Publishers, [2020] ©2020 1 online resource (xliii, 456 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Description based on publisher supplied metadata and other sources. Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection.The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions.The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies. Preface -- Part I: Securing Critical Infrastructures of the Financial Sector -- Security Challenges for the Critical Infrastructures of the Financial Sector -- A Reference Architecture for Securing Infrastructures in the Finance Sector -- FINSTIX: A Security Knowledge Base for the Finance Sector -- Artificial Intelligence Gateway for Cyber-Physical Security in Critical Infrastructure and Finance -- Information Sharing and Stakeholders' Collaboration for Stronger Security in Financial Sector Supply Chains: A Blockchain Approach -- Automated Assistance to the Security Assessment of APIs for Financial Services -- Adaptive and Intelligent Data Collection for Security of Critical Financial Infrastructures and Services -- Part II: Securing Critical Infrastructures of the Health Sector -- Security Challenges for the Critical Infrastructures of the Healthcare Sector -- Security Systems in the Healthcare Sector -- Integrated Cyber-Physical Security Approach for Healthcare Sector -- Vulnerability and incident propagation in cyber-physical systems -- Innovative Toolkit to Assess and Mitigate Cyber Threats in the Healthcare Sector -- Part III: Securing Critical Infrastructures of the Energy Sector -- Security Challenges for the Critical Infrastructures of the Energy Sector -- Securing CEI by-designSecuring CEI by-innovation -- Part IV: Securing Critical Infrastructures of the Communications Sector -- Security and Resilience Challenges for the Critical Infrastructures of the Communications Sector -- Resilience enhancement and risk control Platform for Communication Infrastructure Operators -- Managed Security on 5G communication networks: the Software Defined Security paradigm -- Part V: Sector Agnostic Issues in Critical Infrastructures Protection -- Detection of innovative low-rate denial of service attacks against critical infrastructures -- Resilience analysis and quantification for Critical Infrastructures -- CISIApro Critical Infrastructures Modelling technique for an effective Decision Making Support -- Modern innovative detectors of physical threats for Critical Infrastructures -- The Ethical Aspects of Critical Infrastructure Protection. Computer networks Security measures. Cyber intelligence (Computer security) 1-68083-686-2 |
language |
English |
format |
eBook |
author |
Soldatos, John, |
spellingShingle |
Soldatos, John, Cyber-physical threat intelligence for critical infrastructures security : a guide to integrated cyber-physical protection of modern critical infrastructures / Preface -- Part I: Securing Critical Infrastructures of the Financial Sector -- Security Challenges for the Critical Infrastructures of the Financial Sector -- A Reference Architecture for Securing Infrastructures in the Finance Sector -- FINSTIX: A Security Knowledge Base for the Finance Sector -- Artificial Intelligence Gateway for Cyber-Physical Security in Critical Infrastructure and Finance -- Information Sharing and Stakeholders' Collaboration for Stronger Security in Financial Sector Supply Chains: A Blockchain Approach -- Automated Assistance to the Security Assessment of APIs for Financial Services -- Adaptive and Intelligent Data Collection for Security of Critical Financial Infrastructures and Services -- Part II: Securing Critical Infrastructures of the Health Sector -- Security Challenges for the Critical Infrastructures of the Healthcare Sector -- Security Systems in the Healthcare Sector -- Integrated Cyber-Physical Security Approach for Healthcare Sector -- Vulnerability and incident propagation in cyber-physical systems -- Innovative Toolkit to Assess and Mitigate Cyber Threats in the Healthcare Sector -- Part III: Securing Critical Infrastructures of the Energy Sector -- Security Challenges for the Critical Infrastructures of the Energy Sector -- Securing CEI by-designSecuring CEI by-innovation -- Part IV: Securing Critical Infrastructures of the Communications Sector -- Security and Resilience Challenges for the Critical Infrastructures of the Communications Sector -- Resilience enhancement and risk control Platform for Communication Infrastructure Operators -- Managed Security on 5G communication networks: the Software Defined Security paradigm -- Part V: Sector Agnostic Issues in Critical Infrastructures Protection -- Detection of innovative low-rate denial of service attacks against critical infrastructures -- Resilience analysis and quantification for Critical Infrastructures -- CISIApro Critical Infrastructures Modelling technique for an effective Decision Making Support -- Modern innovative detectors of physical threats for Critical Infrastructures -- The Ethical Aspects of Critical Infrastructure Protection. |
author_facet |
Soldatos, John, |
author_variant |
j s js |
author_role |
VerfasserIn |
author_sort |
Soldatos, John, |
title |
Cyber-physical threat intelligence for critical infrastructures security : a guide to integrated cyber-physical protection of modern critical infrastructures / |
title_sub |
a guide to integrated cyber-physical protection of modern critical infrastructures / |
title_full |
Cyber-physical threat intelligence for critical infrastructures security : a guide to integrated cyber-physical protection of modern critical infrastructures / John Soldatos. |
title_fullStr |
Cyber-physical threat intelligence for critical infrastructures security : a guide to integrated cyber-physical protection of modern critical infrastructures / John Soldatos. |
title_full_unstemmed |
Cyber-physical threat intelligence for critical infrastructures security : a guide to integrated cyber-physical protection of modern critical infrastructures / John Soldatos. |
title_auth |
Cyber-physical threat intelligence for critical infrastructures security : a guide to integrated cyber-physical protection of modern critical infrastructures / |
title_alt |
Cyber-Physical Threat Intelligence for Critical Infrastructures Security |
title_new |
Cyber-physical threat intelligence for critical infrastructures security : |
title_sort |
cyber-physical threat intelligence for critical infrastructures security : a guide to integrated cyber-physical protection of modern critical infrastructures / |
publisher |
Now Publishers, |
publishDate |
2020 |
physical |
1 online resource (xliii, 456 pages) : illustrations |
contents |
Preface -- Part I: Securing Critical Infrastructures of the Financial Sector -- Security Challenges for the Critical Infrastructures of the Financial Sector -- A Reference Architecture for Securing Infrastructures in the Finance Sector -- FINSTIX: A Security Knowledge Base for the Finance Sector -- Artificial Intelligence Gateway for Cyber-Physical Security in Critical Infrastructure and Finance -- Information Sharing and Stakeholders' Collaboration for Stronger Security in Financial Sector Supply Chains: A Blockchain Approach -- Automated Assistance to the Security Assessment of APIs for Financial Services -- Adaptive and Intelligent Data Collection for Security of Critical Financial Infrastructures and Services -- Part II: Securing Critical Infrastructures of the Health Sector -- Security Challenges for the Critical Infrastructures of the Healthcare Sector -- Security Systems in the Healthcare Sector -- Integrated Cyber-Physical Security Approach for Healthcare Sector -- Vulnerability and incident propagation in cyber-physical systems -- Innovative Toolkit to Assess and Mitigate Cyber Threats in the Healthcare Sector -- Part III: Securing Critical Infrastructures of the Energy Sector -- Security Challenges for the Critical Infrastructures of the Energy Sector -- Securing CEI by-designSecuring CEI by-innovation -- Part IV: Securing Critical Infrastructures of the Communications Sector -- Security and Resilience Challenges for the Critical Infrastructures of the Communications Sector -- Resilience enhancement and risk control Platform for Communication Infrastructure Operators -- Managed Security on 5G communication networks: the Software Defined Security paradigm -- Part V: Sector Agnostic Issues in Critical Infrastructures Protection -- Detection of innovative low-rate denial of service attacks against critical infrastructures -- Resilience analysis and quantification for Critical Infrastructures -- CISIApro Critical Infrastructures Modelling technique for an effective Decision Making Support -- Modern innovative detectors of physical threats for Critical Infrastructures -- The Ethical Aspects of Critical Infrastructure Protection. |
isbn |
1-68083-686-2 |
callnumber-first |
T - Technology |
callnumber-subject |
TK - Electrical and Nuclear Engineering |
callnumber-label |
TK5105 |
callnumber-sort |
TK 45105.59 S653 42020 |
illustrated |
Illustrated |
dewey-hundreds |
000 - Computer science, information & general works |
dewey-tens |
000 - Computer science, knowledge & systems |
dewey-ones |
005 - Computer programming, programs & data |
dewey-full |
005.8 |
dewey-sort |
15.8 |
dewey-raw |
005.8 |
dewey-search |
005.8 |
work_keys_str_mv |
AT soldatosjohn cyberphysicalthreatintelligenceforcriticalinfrastructuressecurityaguidetointegratedcyberphysicalprotectionofmoderncriticalinfrastructures AT soldatosjohn cyberphysicalthreatintelligenceforcriticalinfrastructuressecurity |
status_str |
n |
ids_txt_mv |
(CKB)5470000000566737 (NjHacI)995470000000566737 (EXLCZ)995470000000566737 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Cyber-physical threat intelligence for critical infrastructures security : a guide to integrated cyber-physical protection of modern critical infrastructures / |
_version_ |
1796653202129551362 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05432nam a2200313 i 4500</leader><controlfield tag="001">993603117004498</controlfield><controlfield tag="005">20230515205454.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">230515s2020 maua o 000 0 eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5470000000566737</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)995470000000566737</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995470000000566737</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.S653 2020</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Soldatos, John,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber-physical threat intelligence for critical infrastructures security :</subfield><subfield code="b">a guide to integrated cyber-physical protection of modern critical infrastructures /</subfield><subfield code="c">John Soldatos.</subfield></datafield><datafield tag="246" ind1=" " ind2=" "><subfield code="a">Cyber-Physical Threat Intelligence for Critical Infrastructures Security </subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hanover, Massachusetts :</subfield><subfield code="b">Now Publishers,</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xliii, 456 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection.The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions.The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Preface -- Part I: Securing Critical Infrastructures of the Financial Sector -- Security Challenges for the Critical Infrastructures of the Financial Sector -- A Reference Architecture for Securing Infrastructures in the Finance Sector -- FINSTIX: A Security Knowledge Base for the Finance Sector -- Artificial Intelligence Gateway for Cyber-Physical Security in Critical Infrastructure and Finance -- Information Sharing and Stakeholders' Collaboration for Stronger Security in Financial Sector Supply Chains: A Blockchain Approach -- Automated Assistance to the Security Assessment of APIs for Financial Services -- Adaptive and Intelligent Data Collection for Security of Critical Financial Infrastructures and Services -- Part II: Securing Critical Infrastructures of the Health Sector -- Security Challenges for the Critical Infrastructures of the Healthcare Sector -- Security Systems in the Healthcare Sector -- Integrated Cyber-Physical Security Approach for Healthcare Sector -- Vulnerability and incident propagation in cyber-physical systems -- Innovative Toolkit to Assess and Mitigate Cyber Threats in the Healthcare Sector -- Part III: Securing Critical Infrastructures of the Energy Sector -- Security Challenges for the Critical Infrastructures of the Energy Sector -- Securing CEI by-designSecuring CEI by-innovation -- Part IV: Securing Critical Infrastructures of the Communications Sector -- Security and Resilience Challenges for the Critical Infrastructures of the Communications Sector -- Resilience enhancement and risk control Platform for Communication Infrastructure Operators -- Managed Security on 5G communication networks: the Software Defined Security paradigm -- Part V: Sector Agnostic Issues in Critical Infrastructures Protection -- Detection of innovative low-rate denial of service attacks against critical infrastructures -- Resilience analysis and quantification for Critical Infrastructures -- CISIApro Critical Infrastructures Modelling technique for an effective Decision Making Support -- Modern innovative detectors of physical threats for Critical Infrastructures -- The Ethical Aspects of Critical Infrastructure Protection.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-68083-686-2</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-06-09 08:19:03 Europe/Vienna</subfield><subfield code="f">System</subfield><subfield code="c">marc21</subfield><subfield code="a">2021-06-12 22:12:12 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5337709260004498&Force_direct=true</subfield><subfield code="Z">5337709260004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337709260004498</subfield></datafield></record></collection> |