05578nam 2201333z- 450 991055733650332120220111(CKB)5400000000042513(oapen)https://directory.doabooks.org/handle/20.500.12854/77132(oapen)doab77132(EXLCZ)99540000000004251320202201d2021 |y 0engurmn|---annantxtrdacontentcrdamediacrrdacarrierCyber Security of Critical InfrastructuresBasel, SwitzerlandMDPI - Multidisciplinary Digital Publishing Institute20211 online resource (316 p.)3-0365-2726-5 3-0365-2727-3 Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods.Technology: general issuesbicsscanalysis security testingassessment frameworkassessment methodologybloomcloud roboticsCNRcode cryptographycomputers in educationcrypto-ransomwarecyber exercisescyber rangescyber-attackscyber-rangescybercrimecybersecuritydeep learningdeep learning algorithmsDSPTdynamic adaptationdynamic analysisdynamic analysis security testingdynamic malware analysiseducationencryption algorithmsfalse negativefalse positivefine-tuningformal verificationGDPRhash chainHasse diagramhigh performance computingimage classificationimage face recognitionindustrial control systeminteractive analysis security testinginterval-valued complex intuitionistic fuzzy relationsinterval-valued complex intuitionistic fuzzy setslattice cryptographylightweight secure hash (LSH)locker-ransomwaremachine learningmalware analysismalware classificationmilitaryn/aNISDoffensive cybersecurityoffensive cybersecurity frameworkPCI-DSSphysical unclonable functionpost quantum cryptographyprobabilistic model checkingpublic key infrastructurerandom forestresearchrisk assessmentscoring modelsecuritysecurity modellingsecurity trainingsecurity vulnerabilityserious gamessmart gridsmart shippingstatic analysisstatic analysis security testingstatic malware analysisSTRIDEsupport vector machinesT-OTPtestbedsthreat modelingtools combinationtrainingtraining programmestransfer learningVMFweb applicationTechnology: general issuesMaglaras Leandrosedt1293296Kantzavelou IoannaedtFerrag Mohamed AmineedtMaglaras LeandrosothKantzavelou IoannaothFerrag Mohamed AmineothBOOK9910557336503321Cyber Security of Critical Infrastructures3034931UNINA