05541nam 2201309z- 450 991055733650332120231214133439.0(CKB)5400000000042513(oapen)https://directory.doabooks.org/handle/20.500.12854/77132(EXLCZ)99540000000004251320202201d2021 |y 0engurmn|---annantxtrdacontentcrdamediacrrdacarrierCyber Security of Critical InfrastructuresBasel, SwitzerlandMDPI - Multidisciplinary Digital Publishing Institute20211 electronic resource (316 p.)3-0365-2726-5 3-0365-2727-3 Critical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods.Technology: general issuesbicssccrypto-ransomwarelocker-ransomwarestatic analysisdynamic analysismachine learningassessment frameworkcybersecurityGDPRPCI-DSSDSPTNISDcyber-rangessecurity trainingsecurity modellingserious gamesdynamic adaptationtraining programmescomputers in educationbloomSTRIDEsmart shippingmilitaryVMFhash chainT-OTPlightweight secure hash (LSH)CNRweb applicationsecurity vulnerabilityanalysis security testingstatic analysis security testingdynamic analysis security testinginteractive analysis security testingassessment methodologyfalse positivefalse negativetools combinationdeep learningimage classificationtransfer learningindustrial control systemfine-tuningtestbedscyber rangescyber exerciseseducationtrainingresearchlattice cryptographycode cryptographypost quantum cryptographyphysical unclonable functionpublic key infrastructurehigh performance computingmalware analysisstatic malware analysisdynamic malware analysismalware classificationrandom forestsupport vector machinessmart gridrisk assessmentthreat modelingformal verificationprobabilistic model checkingcloud roboticsimage face recognitiondeep learning algorithmssecurityencryption algorithmscybercrimeHasse diagraminterval-valued complex intuitionistic fuzzy relationsinterval-valued complex intuitionistic fuzzy setsoffensive cybersecuritycyber-attacksscoring modeloffensive cybersecurity frameworkTechnology: general issuesMaglaras Leandrosedt1293296Kantzavelou IoannaedtFerrag Mohamed AmineedtMaglaras LeandrosothKantzavelou IoannaothFerrag Mohamed AmineothBOOK9910557336503321Cyber Security of Critical Infrastructures3034931UNINA