Cyber-Physical Threat Intelligence for Critical Infrastructures Security A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures

Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection. The novel methods and techniques of the boo...

Full description

Bibliographic Details
Main Author: Soldatos, John
Other Authors: Philpot, James, Giunta, Gabriele
Format: eBook
Language:English
Published: Norwell, MA Now Publishers 2020
Series:NowOpen
Subjects:
Online Access:
Collection: Directory of Open Access Books - Collection details see MPG.ReNa
LEADER 03658nma a2200385 u 4500
001 EB002045462
003 EBX01000000000000001189128
005 00000000000000.0
007 cr|||||||||||||||||||||
008 220822 ||| eng
020 |a 9781680836868 
020 |a 9781680836875 
100 1 |a Soldatos, John 
245 0 0 |a Cyber-Physical Threat Intelligence for Critical Infrastructures Security  |h Elektronische Ressource  |b A Guide to Integrated Cyber-Physical Protection of Modern Critical Infrastructures 
260 |a Norwell, MA  |b Now Publishers  |c 2020 
300 |a 1 electronic resource (450 p.) 
653 |a Computer networking and communications / bicssc 
653 |a Critical Infrastructure Protection, Security, Cybersecurity, Physical Security, Privacy, Data Protection, GDPR, Risk Assessment, Finance, Healthcare, Energy, Communications 
700 1 |a Philpot, James 
700 1 |a Giunta, Gabriele 
700 1 |a Soldatos, John 
041 0 7 |a eng  |2 ISO 639-2 
989 |b DOAB  |a Directory of Open Access Books 
490 0 |a NowOpen 
500 |a Creative Commons (cc), https://creativecommons.org/licenses/by-nc/4.0/ 
028 5 0 |a 10.1561/9781680836875 
856 4 0 |u https://library.oapen.org/bitstream/20.500.12657/47871/1/9781680836875.pdf  |7 0  |x Verlag  |3 Volltext 
856 4 2 |u https://directory.doabooks.org/handle/20.500.12854/67950  |z DOAB: description of the publication 
082 0 |a 333 
082 0 |a 380 
082 0 |a 610 
082 0 |a 330 
520 |a Likewise, it presets how established security technologies like Security Information and Event Management (SIEM), pen-testing, vulnerability assessment and security data analytics can be used in the context of integrated Critical Infrastructure Protection. The novel methods and techniques of the book are exemplified in case studies involving critical infrastructures in four industrial sectors, namely finance, healthcare, energy and communications. The peculiarities of critical infrastructure protection in each one of these sectors is discussed and addressed based on sector-specific solutions. The advent of the fourth industrial revolution (Industry 4.0) is expected to increase the cyber-physical nature of critical infrastructures as well as their interconnection in the scope of sectorial and cross-sector value chains. Therefore, the demand for solutions that foster the interplay between cyber and physical security, and enable Cyber-Physical Threat Intelligence is likely to explode.  
520 |a In this book, we have shed light on the structure of such integrated security systems, as well as on the technologies that will underpin their operation. We hope that Security and Critical Infrastructure Protection stakeholders will find the book useful when planning their future security strategies. 
520 |a Modern critical infrastructures comprise of many interconnected cyber and physical assets, and as such are large scale cyber-physical systems. Hence, the conventional approach of securing these infrastructures by addressing cyber security and physical security separately is no longer effective. Rather more integrated approaches that address the security of cyber and physical assets at the same time are required. This book presents integrated (i.e. cyber and physical) security approaches and technologies for the critical infrastructures that underpin our societies. Specifically, it introduces advanced techniques for threat detection, risk assessment and security information sharing, based on leading edge technologies like machine learning, security knowledge modelling, IoT security and distributed ledger infrastructures.