Buch, Englisch, 357 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 529 g
Reihe: Security and Cryptology
Advances in Critical Infrastructure Protection: Information Infrastructure Models, Analysis, and Defense
Buch, Englisch, 357 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 529 g
Reihe: Security and Cryptology
ISBN: 978-3-642-28919-4
Verlag: Springer
between sectors as well as often also intra-sectoral control mechanisms.
The 14 papers of this book present a collection of pieces of scientific work in the areas of critical infrastructure protection. In combining elementary concepts and models with policy-related issues on one hand and placing an emphasis on the timely area of control systems, the book aims to highlight some of the key issues facing the research community.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Technische Wissenschaften Sonstige Technologien | Angewandte Technik Militär- und Verteidigungstechnik
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Kryptologie, Informationssicherheit
- Sozialwissenschaften Politikwissenschaft Politische Gewalt Terrorismus, Religiöser Fundamentalismus
- Technische Wissenschaften Technik Allgemein Technische Zuverlässigkeit, Sicherheitstechnik
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
Weitere Infos & Material
Overview of Critical Information Infrastructure Protection.-The Art of CIIP Strategy: Tacking Stock of Content and Processes.-Infrastructure Sectors and the Information Infrastructure.-Understanding Cyber Threats and Vulnerabilities. Modelling Approaches.-Anomaly Detection in Water Management Systems.-Security Aspects of SCADA and DCS Environments.-SCADA Protocol Vulnerabilities.-Protection of SCADA Communication Channels.-Cyber Vulnerability in Power Systems Operation and Control.-Sector-Specific Information Infrastructure Issues in the Oil, Gas, and Petrochemical Sector.-Telecommunications.-Financial Services Industry.-Transportation.
The Art of CIIP Strategy: Tacking Stock of Content and Processes.-Infrastructure Sectors and the Information Infrastructure.-Understanding Cyber Threats and Vulnerabilities. Modelling Approaches.-Anomaly Detection in Water Management Systems.-Security Aspects of SCADA and DCS Environments.-SCADA Protocol Vulnerabilities.-Protection of SCADA Communication Channels.-Cyber Vulnerability in Power Systems Operation and Control.-Sector-Specific Information Infrastructure Issues in the Oil, Gas, and Petrochemical Sector.-Telecommunications.-Financial Services Industry.-Transportation.