Cyber-physical threat intelligence for critical infrastructures security : : a guide to integrated cyber-physical protection of modern critical infrastructures / / John Soldatos.

Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rath...

Full description

Saved in:
Bibliographic Details
VerfasserIn:
Place / Publishing House:Hanover, Massachusetts : : Now Publishers,, [2020]
©2020
Year of Publication:2020
Language:English
Physical Description:1 online resource (xliii, 456 pages) :; illustrations
Tags: Add Tag
No Tags, Be the first to tag this record!
id 993603117004498
ctrlnum (CKB)5470000000566737
(NjHacI)995470000000566737
(EXLCZ)995470000000566737
collection bib_alma
record_format marc
spelling Soldatos, John, author.
Cyber-physical threat intelligence for critical infrastructures security : a guide to integrated cyber-physical protection of modern critical infrastructures / John Soldatos.
Cyber-Physical Threat Intelligence for Critical Infrastructures Security
Hanover, Massachusetts : Now Publishers, [2020]
©2020
1 online resource (xliii, 456 pages) : illustrations
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Description based on publisher supplied metadata and other sources.
Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection.The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions.The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies.
Preface -- Part I: Securing Critical Infrastructures of the Financial Sector -- Security Challenges for the Critical Infrastructures of the Financial Sector -- A Reference Architecture for Securing Infrastructures in the Finance Sector -- FINSTIX: A Security Knowledge Base for the Finance Sector -- Artificial Intelligence Gateway for Cyber-Physical Security in Critical Infrastructure and Finance -- Information Sharing and Stakeholders' Collaboration for Stronger Security in Financial Sector Supply Chains: A Blockchain Approach -- Automated Assistance to the Security Assessment of APIs for Financial Services -- Adaptive and Intelligent Data Collection for Security of Critical Financial Infrastructures and Services -- Part II: Securing Critical Infrastructures of the Health Sector -- Security Challenges for the Critical Infrastructures of the Healthcare Sector -- Security Systems in the Healthcare Sector -- Integrated Cyber-Physical Security Approach for Healthcare Sector -- Vulnerability and incident propagation in cyber-physical systems -- Innovative Toolkit to Assess and Mitigate Cyber Threats in the Healthcare Sector -- Part III: Securing Critical Infrastructures of the Energy Sector -- Security Challenges for the Critical Infrastructures of the Energy Sector -- Securing CEI by-designSecuring CEI by-innovation -- Part IV: Securing Critical Infrastructures of the Communications Sector -- Security and Resilience Challenges for the Critical Infrastructures of the Communications Sector -- Resilience enhancement and risk control Platform for Communication Infrastructure Operators -- Managed Security on 5G communication networks: the Software Defined Security paradigm -- Part V: Sector Agnostic Issues in Critical Infrastructures Protection -- Detection of innovative low-rate denial of service attacks against critical infrastructures -- Resilience analysis and quantification for Critical Infrastructures -- CISIApro Critical Infrastructures Modelling technique for an effective Decision Making Support -- Modern innovative detectors of physical threats for Critical Infrastructures -- The Ethical Aspects of Critical Infrastructure Protection.
Computer networks Security measures.
Cyber intelligence (Computer security)
1-68083-686-2
language English
format eBook
author Soldatos, John,
spellingShingle Soldatos, John,
Cyber-physical threat intelligence for critical infrastructures security : a guide to integrated cyber-physical protection of modern critical infrastructures /
Preface -- Part I: Securing Critical Infrastructures of the Financial Sector -- Security Challenges for the Critical Infrastructures of the Financial Sector -- A Reference Architecture for Securing Infrastructures in the Finance Sector -- FINSTIX: A Security Knowledge Base for the Finance Sector -- Artificial Intelligence Gateway for Cyber-Physical Security in Critical Infrastructure and Finance -- Information Sharing and Stakeholders' Collaboration for Stronger Security in Financial Sector Supply Chains: A Blockchain Approach -- Automated Assistance to the Security Assessment of APIs for Financial Services -- Adaptive and Intelligent Data Collection for Security of Critical Financial Infrastructures and Services -- Part II: Securing Critical Infrastructures of the Health Sector -- Security Challenges for the Critical Infrastructures of the Healthcare Sector -- Security Systems in the Healthcare Sector -- Integrated Cyber-Physical Security Approach for Healthcare Sector -- Vulnerability and incident propagation in cyber-physical systems -- Innovative Toolkit to Assess and Mitigate Cyber Threats in the Healthcare Sector -- Part III: Securing Critical Infrastructures of the Energy Sector -- Security Challenges for the Critical Infrastructures of the Energy Sector -- Securing CEI by-designSecuring CEI by-innovation -- Part IV: Securing Critical Infrastructures of the Communications Sector -- Security and Resilience Challenges for the Critical Infrastructures of the Communications Sector -- Resilience enhancement and risk control Platform for Communication Infrastructure Operators -- Managed Security on 5G communication networks: the Software Defined Security paradigm -- Part V: Sector Agnostic Issues in Critical Infrastructures Protection -- Detection of innovative low-rate denial of service attacks against critical infrastructures -- Resilience analysis and quantification for Critical Infrastructures -- CISIApro Critical Infrastructures Modelling technique for an effective Decision Making Support -- Modern innovative detectors of physical threats for Critical Infrastructures -- The Ethical Aspects of Critical Infrastructure Protection.
author_facet Soldatos, John,
author_variant j s js
author_role VerfasserIn
author_sort Soldatos, John,
title Cyber-physical threat intelligence for critical infrastructures security : a guide to integrated cyber-physical protection of modern critical infrastructures /
title_sub a guide to integrated cyber-physical protection of modern critical infrastructures /
title_full Cyber-physical threat intelligence for critical infrastructures security : a guide to integrated cyber-physical protection of modern critical infrastructures / John Soldatos.
title_fullStr Cyber-physical threat intelligence for critical infrastructures security : a guide to integrated cyber-physical protection of modern critical infrastructures / John Soldatos.
title_full_unstemmed Cyber-physical threat intelligence for critical infrastructures security : a guide to integrated cyber-physical protection of modern critical infrastructures / John Soldatos.
title_auth Cyber-physical threat intelligence for critical infrastructures security : a guide to integrated cyber-physical protection of modern critical infrastructures /
title_alt Cyber-Physical Threat Intelligence for Critical Infrastructures Security
title_new Cyber-physical threat intelligence for critical infrastructures security :
title_sort cyber-physical threat intelligence for critical infrastructures security : a guide to integrated cyber-physical protection of modern critical infrastructures /
publisher Now Publishers,
publishDate 2020
physical 1 online resource (xliii, 456 pages) : illustrations
contents Preface -- Part I: Securing Critical Infrastructures of the Financial Sector -- Security Challenges for the Critical Infrastructures of the Financial Sector -- A Reference Architecture for Securing Infrastructures in the Finance Sector -- FINSTIX: A Security Knowledge Base for the Finance Sector -- Artificial Intelligence Gateway for Cyber-Physical Security in Critical Infrastructure and Finance -- Information Sharing and Stakeholders' Collaboration for Stronger Security in Financial Sector Supply Chains: A Blockchain Approach -- Automated Assistance to the Security Assessment of APIs for Financial Services -- Adaptive and Intelligent Data Collection for Security of Critical Financial Infrastructures and Services -- Part II: Securing Critical Infrastructures of the Health Sector -- Security Challenges for the Critical Infrastructures of the Healthcare Sector -- Security Systems in the Healthcare Sector -- Integrated Cyber-Physical Security Approach for Healthcare Sector -- Vulnerability and incident propagation in cyber-physical systems -- Innovative Toolkit to Assess and Mitigate Cyber Threats in the Healthcare Sector -- Part III: Securing Critical Infrastructures of the Energy Sector -- Security Challenges for the Critical Infrastructures of the Energy Sector -- Securing CEI by-designSecuring CEI by-innovation -- Part IV: Securing Critical Infrastructures of the Communications Sector -- Security and Resilience Challenges for the Critical Infrastructures of the Communications Sector -- Resilience enhancement and risk control Platform for Communication Infrastructure Operators -- Managed Security on 5G communication networks: the Software Defined Security paradigm -- Part V: Sector Agnostic Issues in Critical Infrastructures Protection -- Detection of innovative low-rate denial of service attacks against critical infrastructures -- Resilience analysis and quantification for Critical Infrastructures -- CISIApro Critical Infrastructures Modelling technique for an effective Decision Making Support -- Modern innovative detectors of physical threats for Critical Infrastructures -- The Ethical Aspects of Critical Infrastructure Protection.
isbn 1-68083-686-2
callnumber-first T - Technology
callnumber-subject TK - Electrical and Nuclear Engineering
callnumber-label TK5105
callnumber-sort TK 45105.59 S653 42020
illustrated Illustrated
dewey-hundreds 000 - Computer science, information & general works
dewey-tens 000 - Computer science, knowledge & systems
dewey-ones 005 - Computer programming, programs & data
dewey-full 005.8
dewey-sort 15.8
dewey-raw 005.8
dewey-search 005.8
work_keys_str_mv AT soldatosjohn cyberphysicalthreatintelligenceforcriticalinfrastructuressecurityaguidetointegratedcyberphysicalprotectionofmoderncriticalinfrastructures
AT soldatosjohn cyberphysicalthreatintelligenceforcriticalinfrastructuressecurity
status_str n
ids_txt_mv (CKB)5470000000566737
(NjHacI)995470000000566737
(EXLCZ)995470000000566737
carrierType_str_mv cr
is_hierarchy_title Cyber-physical threat intelligence for critical infrastructures security : a guide to integrated cyber-physical protection of modern critical infrastructures /
_version_ 1796653202129551362
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05432nam a2200313 i 4500</leader><controlfield tag="001">993603117004498</controlfield><controlfield tag="005">20230515205454.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">230515s2020 maua o 000 0 eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)5470000000566737</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(NjHacI)995470000000566737</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)995470000000566737</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">NjHacI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">NjHacl</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.S653 2020</subfield></datafield><datafield tag="082" ind1="0" ind2="4"><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Soldatos, John,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber-physical threat intelligence for critical infrastructures security :</subfield><subfield code="b">a guide to integrated cyber-physical protection of modern critical infrastructures /</subfield><subfield code="c">John Soldatos.</subfield></datafield><datafield tag="246" ind1=" " ind2=" "><subfield code="a">Cyber-Physical Threat Intelligence for Critical Infrastructures Security </subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hanover, Massachusetts :</subfield><subfield code="b">Now Publishers,</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xliii, 456 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures. Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection.The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions.The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode. In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Preface -- Part I: Securing Critical Infrastructures of the Financial Sector -- Security Challenges for the Critical Infrastructures of the Financial Sector -- A Reference Architecture for Securing Infrastructures in the Finance Sector -- FINSTIX: A Security Knowledge Base for the Finance Sector -- Artificial Intelligence Gateway for Cyber-Physical Security in Critical Infrastructure and Finance -- Information Sharing and Stakeholders' Collaboration for Stronger Security in Financial Sector Supply Chains: A Blockchain Approach -- Automated Assistance to the Security Assessment of APIs for Financial Services -- Adaptive and Intelligent Data Collection for Security of Critical Financial Infrastructures and Services -- Part II: Securing Critical Infrastructures of the Health Sector -- Security Challenges for the Critical Infrastructures of the Healthcare Sector -- Security Systems in the Healthcare Sector -- Integrated Cyber-Physical Security Approach for Healthcare Sector -- Vulnerability and incident propagation in cyber-physical systems -- Innovative Toolkit to Assess and Mitigate Cyber Threats in the Healthcare Sector -- Part III: Securing Critical Infrastructures of the Energy Sector -- Security Challenges for the Critical Infrastructures of the Energy Sector -- Securing CEI by-designSecuring CEI by-innovation -- Part IV: Securing Critical Infrastructures of the Communications Sector -- Security and Resilience Challenges for the Critical Infrastructures of the Communications Sector -- Resilience enhancement and risk control Platform for Communication Infrastructure Operators -- Managed Security on 5G communication networks: the Software Defined Security paradigm -- Part V: Sector Agnostic Issues in Critical Infrastructures Protection -- Detection of innovative low-rate denial of service attacks against critical infrastructures -- Resilience analysis and quantification for Critical Infrastructures -- CISIApro Critical Infrastructures Modelling technique for an effective Decision Making Support -- Modern innovative detectors of physical threats for Critical Infrastructures -- The Ethical Aspects of Critical Infrastructure Protection.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">1-68083-686-2</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2023-06-09 08:19:03 Europe/Vienna</subfield><subfield code="f">System</subfield><subfield code="c">marc21</subfield><subfield code="a">2021-06-12 22:12:12 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&amp;portfolio_pid=5337709260004498&amp;Force_direct=true</subfield><subfield code="Z">5337709260004498</subfield><subfield code="b">Available</subfield><subfield code="8">5337709260004498</subfield></datafield></record></collection>