Feedback

X
Cyber Security of Critical Infrastructures

Cyber Security of Critical Infrastructures

0 Ungluers have Faved this Work
Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods.

This book is included in DOAB.

Why read this book? Have your say.

You must be logged in to comment.

Rights Information

Are you the author or publisher of this work? If so, you can claim it as yours by registering as an Unglue.it rights holder.

Downloads

This work has been downloaded 50 times via unglue.it ebook links.
  1. 50 - pdf (CC BY) at Unglue.it.

Keywords

  • analysis security testing
  • assessment framework
  • assessment methodology
  • bloom
  • cloud robotics
  • CNR
  • code cryptography
  • computers in education
  • crypto-ransomware
  • cyber exercises
  • cyber ranges
  • cyber-attacks
  • cyber-ranges
  • Cybercrime
  • cybersecurity
  • deep learning
  • Deep Learning Algorithms
  • DSPT
  • dynamic adaptation
  • dynamic analysis
  • dynamic analysis security testing
  • dynamic malware analysis
  • Education
  • encryption algorithms
  • false negative
  • false positive
  • fine-tuning
  • formal verification
  • GDPR
  • hash chain
  • Hasse diagram
  • High performance computing
  • image classification
  • image face recognition
  • Industrial Control System
  • interactive analysis security testing
  • interval-valued complex intuitionistic fuzzy relations
  • interval-valued complex intuitionistic fuzzy sets
  • lattice cryptography
  • lightweight secure hash (LSH)
  • locker-ransomware
  • Machine learning
  • malware analysis
  • malware classification
  • Military
  • n/a
  • NISD
  • offensive cybersecurity
  • offensive cybersecurity framework
  • PCI-DSS
  • physical unclonable function
  • post quantum cryptography
  • probabilistic model checking
  • public key infrastructure
  • random forest
  • Research
  • Risk assessment
  • scoring model
  • security
  • Security Modelling
  • security training
  • security vulnerability
  • serious games
  • Smart grid
  • smart shipping
  • static analysis
  • static analysis security testing
  • static malware analysis
  • STRIDE
  • support vector machines
  • T-OTP
  • Technology, engineering, agriculture
  • Technology: general issues
  • testbeds
  • threat modeling
  • tools combination
  • Training
  • training programmes
  • transfer learning
  • VMF
  • web application

Links

DOI: 10.3390/books978-3-0365-2727-7

Editions

edition cover

Share

Copy/paste this into your site: