|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910739483103321 |
|
|
Titolo |
Cyber security : deterrence and IT protection for critical infrastructures / / Maurizio Martellini, editor |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New York : , : Springer, , 2013 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2013.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (xiv, 72 pages) : color illustrations |
|
|
|
|
|
|
Collana |
|
SpringerBriefs in Computer Science, , 2191-5768 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks - Security measures |
Internet - Security measures |
Data encryption (Computer science) |
Deterrence (Strategy) |
Penetration testing (Computer security) |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Cyber as Deterrent -- Cyber Security and Cyber Weapons: is Nonproliferation possible? -- Cyber Security for Nuclear Power Plants -- Cyber Security for Chemical Plants -- From Fortress to Resilience -- Cyber Security and Resilience of Industrial Control Systems and Critical Infrastructures. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on the deterrence power of cyber attacks and argues that nations are entering a new cyber arms race. The brief also provides a technical analysis of possible cyber attacks towards critical infrastructures in the chemical industry and chemical safety industry. The authors also propose modern analyses and a holistic approach to resilience and security of Industrial Control Systems. The combination of contextual overview and future directions in the field makes this brief a useful resource for researchers and professionals studying systems security, data security and data structures. Advanced-level students interested in data security will also find this brief a helpful guide to recent |
|
|
|
|