Cyber Security of Critical Infrastructures

Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable...

Full description

Bibliographic Details
Main Author: Maglaras, Leandros
Other Authors: Kantzavelou, Ioanna, Ferrag, Mohamed Amine
Format: eBook
Language:English
Published: Basel, Switzerland MDPI - Multidisciplinary Digital Publishing Institute 2021
Subjects:
N/a
Cnr
Vmf
Online Access:
Collection: Directory of Open Access Books - Collection details see MPG.ReNa
LEADER 05556nma a2201285 u 4500
001 EB002048473
003 EBX01000000000000001192139
005 00000000000000.0
007 cr|||||||||||||||||||||
008 220822 ||| eng
020 |a 9783036527277 
020 |a 9783036527260 
020 |a books978-3-0365-2727-7 
100 1 |a Maglaras, Leandros 
245 0 0 |a Cyber Security of Critical Infrastructures  |h Elektronische Ressource 
260 |a Basel, Switzerland  |b MDPI - Multidisciplinary Digital Publishing Institute  |c 2021 
300 |a 1 electronic resource (316 p.) 
653 |a T-OTP 
653 |a machine learning 
653 |a Hasse diagram 
653 |a training programmes 
653 |a post quantum cryptography 
653 |a probabilistic model checking 
653 |a random forest 
653 |a support vector machines 
653 |a n/a 
653 |a security training 
653 |a offensive cybersecurity 
653 |a image face recognition 
653 |a web application 
653 |a deep learning 
653 |a PCI-DSS 
653 |a offensive cybersecurity framework 
653 |a military 
653 |a computers in education 
653 |a high performance computing 
653 |a public key infrastructure 
653 |a CNR 
653 |a locker-ransomware 
653 |a smart shipping 
653 |a crypto-ransomware 
653 |a tools combination 
653 |a interval-valued complex intuitionistic fuzzy relations 
653 |a false positive 
653 |a Technology: general issues / bicssc 
653 |a interval-valued complex intuitionistic fuzzy sets 
653 |a industrial control system 
653 |a assessment methodology 
653 |a security modelling 
653 |a GDPR 
653 |a hash chain 
653 |a serious games 
653 |a transfer learning 
653 |a risk assessment 
653 |a dynamic malware analysis 
653 |a cyber-ranges 
653 |a static analysis 
653 |a false negative 
653 |a cyber exercises 
653 |a malware analysis 
653 |a cyber ranges 
653 |a security 
653 |a formal verification 
653 |a education 
653 |a static analysis security testing 
653 |a threat modeling 
653 |a malware classification 
653 |a lattice cryptography 
653 |a training 
653 |a interactive analysis security testing 
653 |a code cryptography 
653 |a research 
653 |a smart grid 
653 |a static malware analysis 
653 |a NISD 
653 |a VMF 
653 |a cloud robotics 
653 |a encryption algorithms 
653 |a dynamic analysis security testing 
653 |a bloom 
653 |a lightweight secure hash (LSH) 
653 |a image classification 
653 |a STRIDE 
653 |a physical unclonable function 
653 |a testbeds 
653 |a scoring model 
653 |a dynamic analysis 
653 |a security vulnerability 
653 |a fine-tuning 
653 |a DSPT 
653 |a assessment framework 
653 |a cyber-attacks 
653 |a analysis security testing 
653 |a cybersecurity 
653 |a cybercrime 
653 |a deep learning algorithms 
653 |a dynamic adaptation 
700 1 |a Kantzavelou, Ioanna 
700 1 |a Ferrag, Mohamed Amine 
700 1 |a Maglaras, Leandros 
041 0 7 |a eng  |2 ISO 639-2 
989 |b DOAB  |a Directory of Open Access Books 
500 |a Creative Commons (cc), https://creativecommons.org/licenses/by/4.0/ 
024 8 |a 10.3390/books978-3-0365-2727-7 
856 4 0 |u https://www.mdpi.com/books/pdfview/book/4750  |7 0  |x Verlag  |3 Volltext 
856 4 2 |u https://directory.doabooks.org/handle/20.500.12854/77132  |z DOAB: description of the publication 
082 0 |a 370 
082 0 |a 700 
082 0 |a 600 
520 |a Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods.