Critical Infrastructure Protection, 2012
Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense

Security and Cryptology Series

Coordinators: Lopez Javier, Setola Roberto, Wolthusen Stephen

Language: English

79.11 €

In Print (Delivery period: 15 days).

Add to cartAdd to cart
Publication date:
357 p. · 15.5x23.5 cm · Paperback
The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critical Information Infrastructure (CII), which not only forms one of the constituent sectors of the overall CI, but also is unique in providing an element of interconnection between sectors as well as often also intra-sectoral control mechanisms. The 14 papers of this book present a collection of pieces of scientific work in the areas of critical infrastructure protection. In combining elementary concepts and models with policy-related issues on one hand and placing an emphasis on the timely area of control systems, the book aims to highlight some of the key issues facing the research community.

Overview of Critical Information Infrastructure Protection.-The Art of CIIP Strategy: Tacking Stock of Content and Processes.-Infrastructure Sectors and the Information Infrastructure.-Understanding Cyber Threats and Vulnerabilities. Modelling Approaches.-Anomaly Detection in Water Management Systems.-Security Aspects of SCADA and DCS Environments.-SCADA Protocol Vulnerabilities.-Protection of SCADA Communication Channels.-Cyber Vulnerability in Power Systems Operation and Control.-Sector-Specific Information Infrastructure Issues in the Oil, Gas, and Petrochemical Sector.-Telecommunications.-Financial Services Industry.-Transportation.

The Art of CIIP Strategy: Tacking Stock of Content and Processes.-Infrastructure Sectors and the Information Infrastructure.-Understanding Cyber Threats and Vulnerabilities. Modelling Approaches.-Anomaly Detection in Water Management Systems.-Security Aspects of SCADA and DCS Environments.-SCADA Protocol Vulnerabilities.-Protection of SCADA Communication Channels.-Cyber Vulnerability in Power Systems Operation and Control.-Sector-Specific Information Infrastructure Issues in the Oil, Gas, and Petrochemical Sector.-Telecommunications.-Financial Services Industry.-Transportation.

High quality selected papers

State-of-the-art research

unique visibility