LEADER 03999nam 22006135 450 001 9910164157203321 005 20200703154403.0 024 7 $a10.1007/978-3-319-52905-9 035 $a(CKB)3710000001055670 035 $a(DE-He213)978-3-319-52905-9 035 $a(MiAaPQ)EBC4803153 035 $a(PPN)198870477 035 $a(EXLCZ)993710000001055670 100 $a20170209d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security of Highly Critical Wireless Networks /$fby Maurizio Martellini, Stanislav Abaimov, Sandro Gaycken, Clay Wilson 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (VII, 73 p. 1 illus.) 225 1 $aSpringerBriefs in Computer Science,$x2191-5768 311 $a3-319-52905-6 311 $a3-319-52904-8 320 $aIncludes bibliographical references at the end of each chapters. 327 $aIntroduction -- What is Highly Critical Wireless Networking (HCWN) -- Applications for HCWN -- Vulnerabilities and Security Issues -- Modeling Threats and Risks -- Modeling Vulnerabilities -- Governance and Management Frameworks -- Security Technologies for Networked Devices -- Known Weaknesses with Security Controls -- Competent Reliable Operation of HCWN -- Assessing the Effectiveness and Efficiency of Security Approaches -- Examples in Brief -- Testing the Resilience of HCWN -- Future Attack Patterns -- Assessing Cyber Attacks against Wireless Networks for the Next Global Internet of Things Revolution -- Conclusion. 330 $aThis SpringerBrief explores features of digital protocol wireless communications systems, and features of the emerging electrical smart grid. Both low power and high power wireless systems are described. The work also examines the cybersecurity vulnerabilities, threats and current levels of risks to critical infrastructures that rely on digital wireless technologies. Specific topics include areas of application for high criticality wireless networks (HCWN), modeling risks and vulnerabilities, governance and management frameworks, systemic mitigation, reliable operation, assessing effectiveness and efficiency, resilience testing, and accountability of HCWN. Designed for researchers and professionals, this SpringerBrief provides essential information for avoiding malevolent uses of wireless networks. The content is also valuable for advanced-level students interested in security studies or wireless networks. 410 0$aSpringerBriefs in Computer Science,$x2191-5768 606 $aComputer security 606 $aComputer networks 606 $aElectrical engineering 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCommunications Engineering, Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/T24035 615 0$aComputer security. 615 0$aComputer networks. 615 0$aElectrical engineering. 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aCommunications Engineering, Networks. 676 $a621.382 700 $aMartellini$b Maurizio$4aut$4http://id.loc.gov/vocabulary/relators/aut$01062344 702 $aAbaimov$b Stanislav$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aGaycken$b Sandro$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aWilson$b Clay$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910164157203321 996 $aInformation Security of Highly Critical Wireless Networks$92524464 997 $aUNINA