Cyber Security of Critical Infrastructures

Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable...

Full description

Saved in:
Bibliographic Details
Other Authors: Maglaras, Leandros (Editor), Kantzavelou, Ioanna (Editor), Ferrag, Mohamed Amine (Editor)
Format: Book Chapter
Published: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute 2021
Subjects:
Online Access:Get Fullteks
DOAB: description of the publication
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 05597naaaa2201273uu 4500
001 doab_20_500_12854_77132
005 20220111
020 |a books978-3-0365-2727-7 
020 |a 9783036527260 
020 |a 9783036527277 
024 7 |a 10.3390/books978-3-0365-2727-7  |c doi 
041 0 |a English 
042 |a dc 
072 7 |a TB  |2 bicssc 
100 1 |a Maglaras, Leandros  |4 edt 
700 1 |a Kantzavelou, Ioanna  |4 edt 
700 1 |a Ferrag, Mohamed Amine  |4 edt 
700 1 |a Maglaras, Leandros  |4 oth 
700 1 |a Kantzavelou, Ioanna  |4 oth 
700 1 |a Ferrag, Mohamed Amine  |4 oth 
245 1 0 |a Cyber Security of Critical Infrastructures 
260 |a Basel, Switzerland  |b MDPI - Multidisciplinary Digital Publishing Institute  |c 2021 
300 |a 1 electronic resource (316 p.) 
506 0 |a Open Access  |2 star  |f Unrestricted online access 
520 |a Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods. 
540 |a Creative Commons  |f https://creativecommons.org/licenses/by/4.0/  |2 cc  |4 https://creativecommons.org/licenses/by/4.0/ 
546 |a English 
650 7 |a Technology: general issues  |2 bicssc 
653 |a crypto-ransomware 
653 |a locker-ransomware 
653 |a static analysis 
653 |a dynamic analysis 
653 |a machine learning 
653 |a assessment framework 
653 |a cybersecurity 
653 |a GDPR 
653 |a PCI-DSS 
653 |a DSPT 
653 |a NISD 
653 |a cyber-ranges 
653 |a security training 
653 |a security modelling 
653 |a serious games 
653 |a dynamic adaptation 
653 |a training programmes 
653 |a computers in education 
653 |a bloom 
653 |a STRIDE 
653 |a smart shipping 
653 |a military 
653 |a VMF 
653 |a hash chain 
653 |a T-OTP 
653 |a lightweight secure hash (LSH) 
653 |a CNR 
653 |a web application 
653 |a security vulnerability 
653 |a analysis security testing 
653 |a static analysis security testing 
653 |a dynamic analysis security testing 
653 |a interactive analysis security testing 
653 |a assessment methodology 
653 |a false positive 
653 |a false negative 
653 |a tools combination 
653 |a deep learning 
653 |a image classification 
653 |a transfer learning 
653 |a industrial control system 
653 |a fine-tuning 
653 |a testbeds 
653 |a cyber ranges 
653 |a cyber exercises 
653 |a education 
653 |a training 
653 |a research 
653 |a lattice cryptography 
653 |a code cryptography 
653 |a post quantum cryptography 
653 |a physical unclonable function 
653 |a public key infrastructure 
653 |a high performance computing 
653 |a malware analysis 
653 |a static malware analysis 
653 |a dynamic malware analysis 
653 |a malware classification 
653 |a random forest 
653 |a support vector machines 
653 |a smart grid 
653 |a risk assessment 
653 |a threat modeling 
653 |a formal verification 
653 |a probabilistic model checking 
653 |a cloud robotics 
653 |a image face recognition 
653 |a deep learning algorithms 
653 |a security 
653 |a encryption algorithms 
653 |a cybercrime 
653 |a Hasse diagram 
653 |a interval-valued complex intuitionistic fuzzy relations 
653 |a interval-valued complex intuitionistic fuzzy sets 
653 |a offensive cybersecurity 
653 |a cyber-attacks 
653 |a scoring model 
653 |a offensive cybersecurity framework 
653 |a n/a 
856 4 0 |a www.oapen.org  |u https://mdpi.com/books/pdfview/book/4750  |7 0  |z Get Fullteks 
856 4 0 |a www.oapen.org  |u https://directory.doabooks.org/handle/20.500.12854/77132  |7 0  |z DOAB: description of the publication