|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996499857703316 |
|
|
Autore |
Neshenko Nataliia |
|
|
Titolo |
Smart cities : cyber situational awareness to support decision making / / Nataliia Neshenko, Elias Bou-Harb, and Borko Furht |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham, Switzerland : , : Springer, , [2022] |
|
©2022 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (134 pages) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks - Security measures |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references. |
|
|
|
|
|
|
Nota di contenuto |
|
Intro -- Preface -- What Is Covered in This Book? -- Contents -- Part I Cybersecurity of Smart City -- 1 Rise of Smart Cities -- 1.1 Forces of Change -- 1.2 Set the Scene for Smart City -- 1.2.1 What Make City Smart? -- 1.2.2 Dimensions of Smart City -- 1.2.2.1 Physical Tier -- 1.2.2.2 Technological Tier -- 1.2.2.3 Analytical Tier -- 1.2.2.4 Operational Tier -- 1.2.2.5 Management Tier -- 1.2.2.6 Stakeholder Tier -- 1.3 Summary -- References -- 2 Cyber Brittleness of Smart Cities -- 2.1 Cybersecurity of Smart Cities vs Enterprise IT Security -- 2.2 Cyber Incidents: Decades in Retrospect -- 2.2.1 The Colonial Pipeline Attack -- 2.2.2 Israel's Water System Attack -- 2.2.3 Onslow Water and Sewer Company Hack -- 2.2.4 Battle of City Atlanta -- 2.2.5 Kemuri Water Company -- 2.2.6 Ukraine Power Grid Attack -- 2.2.7 German Steel Mill Attack -- 2.2.8 The Cyber-Attack on Saudi Aramco -- 2.3 Adversary Model -- 2.3.1 Attackers -- 2.3.2 Impact of Cyber-Attacks -- 2.3.3 Categorization of Cyber Threats -- 2.3.3.1 Discovery Threats -- 2.3.3.2 Infrastructure Threats -- 2.3.3.3 Data Threats -- 2.3.3.4 Third-Party Vulnerability -- 2.4 Summary -- References -- Part II Cyber Situational Awareness for Smart City -- 3 Cyber Situational Awareness Frontiers -- 3.1 Toward Analytics-Driven Situational Awareness -- 3.1.1 Data Analytical Techniques -- 3.1.1.1 Machine Learning and Data Mining Methods -- 3.1.1.2 Knowledge-Based Models -- 3.1.2 Threat Perception: Attack Detection Methods -- 3.1.3 Evaluation Metrics -- 3.1.4 Threat Comprehension: Risk Analysis and |
|
|
|
|