LEADER 05541nam 2201309z- 450 001 9910557336503321 005 20231214133439.0 035 $a(CKB)5400000000042513 035 $a(oapen)https://directory.doabooks.org/handle/20.500.12854/77132 035 $a(EXLCZ)995400000000042513 100 $a20202201d2021 |y 0 101 0 $aeng 135 $aurmn|---annan 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Security of Critical Infrastructures 210 $aBasel, Switzerland$cMDPI - Multidisciplinary Digital Publishing Institute$d2021 215 $a1 electronic resource (316 p.) 311 $a3-0365-2726-5 311 $a3-0365-2727-3 330 $aCritical infrastructures are vital assets for public safety, economic welfare, and the national security of countries. The vulnerabilities of critical infrastructures have increased with the widespread use of information technologies. As Critical National Infrastructures are becoming more vulnerable to cyber-attacks, their protection becomes a significant issue for organizations as well as nations. The risks to continued operations, from failing to upgrade aging infrastructure or not meeting mandated regulatory regimes, are considered highly significant, given the demonstrable impact of such circumstances. Due to the rapid increase of sophisticated cyber threats targeting critical infrastructures with significant destructive effects, the cybersecurity of critical infrastructures has become an agenda item for academics, practitioners, and policy makers. A holistic view which covers technical, policy, human, and behavioural aspects is essential to handle cyber security of critical infrastructures effectively. Moreover, the ability to attribute crimes to criminals is a vital element of avoiding impunity in cyberspace. In this book, both research and practical aspects of cyber security considerations in critical infrastructures are presented. Aligned with the interdisciplinary nature of cyber security, authors from academia, government, and industry have contributed 13 chapters. The issues that are discussed and analysed include cybersecurity training, maturity assessment frameworks, malware analysis techniques, ransomware attacks, security solutions for industrial control systems, and privacy preservation methods. 606 $aTechnology: general issues$2bicssc 610 $acrypto-ransomware 610 $alocker-ransomware 610 $astatic analysis 610 $adynamic analysis 610 $amachine learning 610 $aassessment framework 610 $acybersecurity 610 $aGDPR 610 $aPCI-DSS 610 $aDSPT 610 $aNISD 610 $acyber-ranges 610 $asecurity training 610 $asecurity modelling 610 $aserious games 610 $adynamic adaptation 610 $atraining programmes 610 $acomputers in education 610 $abloom 610 $aSTRIDE 610 $asmart shipping 610 $amilitary 610 $aVMF 610 $ahash chain 610 $aT-OTP 610 $alightweight secure hash (LSH) 610 $aCNR 610 $aweb application 610 $asecurity vulnerability 610 $aanalysis security testing 610 $astatic analysis security testing 610 $adynamic analysis security testing 610 $ainteractive analysis security testing 610 $aassessment methodology 610 $afalse positive 610 $afalse negative 610 $atools combination 610 $adeep learning 610 $aimage classification 610 $atransfer learning 610 $aindustrial control system 610 $afine-tuning 610 $atestbeds 610 $acyber ranges 610 $acyber exercises 610 $aeducation 610 $atraining 610 $aresearch 610 $alattice cryptography 610 $acode cryptography 610 $apost quantum cryptography 610 $aphysical unclonable function 610 $apublic key infrastructure 610 $ahigh performance computing 610 $amalware analysis 610 $astatic malware analysis 610 $adynamic malware analysis 610 $amalware classification 610 $arandom forest 610 $asupport vector machines 610 $asmart grid 610 $arisk assessment 610 $athreat modeling 610 $aformal verification 610 $aprobabilistic model checking 610 $acloud robotics 610 $aimage face recognition 610 $adeep learning algorithms 610 $asecurity 610 $aencryption algorithms 610 $acybercrime 610 $aHasse diagram 610 $ainterval-valued complex intuitionistic fuzzy relations 610 $ainterval-valued complex intuitionistic fuzzy sets 610 $aoffensive cybersecurity 610 $acyber-attacks 610 $ascoring model 610 $aoffensive cybersecurity framework 615 7$aTechnology: general issues 700 $aMaglaras$b Leandros$4edt$01293296 702 $aKantzavelou$b Ioanna$4edt 702 $aFerrag$b Mohamed Amine$4edt 702 $aMaglaras$b Leandros$4oth 702 $aKantzavelou$b Ioanna$4oth 702 $aFerrag$b Mohamed Amine$4oth 906 $aBOOK 912 $a9910557336503321 996 $aCyber Security of Critical Infrastructures$93034931 997 $aUNINA