LEADER 03979nam 22006135 450 001 9910558483803321 005 20250829094655.0 010 $a3-030-91293-0 024 7 $a10.1007/978-3-030-91293-2 035 $a(MiAaPQ)EBC6945294 035 $a(Au-PeEL)EBL6945294 035 $a(CKB)21459582900041 035 $a(PPN)262167921 035 $a(DE-He213)978-3-030-91293-2 035 $a(EXLCZ)9921459582900041 100 $a20220402d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Security $eCritical Infrastructure Protection /$fedited by Martti Lehto, Pekka Neittaanmäki 205 $a1st ed. 2022. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2022. 215 $a1 online resource (487 pages) 225 1 $aComputational Methods in Applied Sciences,$x2543-0203 ;$v56 311 08$aPrint version: Lehto, Martti Cyber Security Cham : Springer International Publishing AG,c2022 9783030912925 320 $aIncludes bibliographical references. 327 $aPart I: Digital society. Chapter 1: Cyber-attacks Against Critical Infrastructure -- Chapter 2: Key Elements of On-line Cyber Security Exercise and Survey of Learning During the On-line Cyber Security Exercise -- Chapter 3: Cyber Law and Regulation -- Chapter 4: Understanding and Gaining Human Resilience Against Negative Effects of Digitalization -- Chapter 5: Users? Psychopathologies: Impact on Cybercrime Vulnerabilities and Cybersecurity Behavior -- Chapter 6: Process Ontology Approach to Military Influence Operations -- Part II: Critical infrastructure protection. Chapter 7: Future Smart Societies? Infrastructures and Services in the Cyber Environments -- Chapter 8: Cyber Security in Healthcare Systems -- Chapter 9: Cyber Security of an Electric Power System in Critical Infrastructure -- Chapter 10: Maritime Cybersecurity: Meeting Threats to Globalization?s Great Conveyor. 330 $aThis book focus on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges in cyberspace and provide novel solutions in various aspects. The first part of the book focus on digital society, addressing critical infrastructure and different forms of the digitalization, strategic focus on cyber security, legal aspects on cyber security, citizen in digital society, and cyber security training. The second part focus on the critical infrastructure protection in different areas of the critical infrastructure. The chapters cover the cybersecurity situation awareness, aviation and air traffic control, cyber security in smart societies and cities, cyber security in smart buildings, maritime cyber security, cyber security in energy systems, and cyber security in healthcare. The third part presents the impact of new technologies upon cyber capability building as well as new challenges brought about by new technologies. These new technologies are among others are quantum technology, firmware and wireless technologies, malware analysis, virtualization. 410 0$aComputational Methods in Applied Sciences,$x2543-0203 ;$v56 606 $aData protection 606 $aComputer crimes 606 $aCooperating objects (Computer systems) 606 $aData and Information Security 606 $aCybercrime 606 $aCyber-Physical Systems 615 0$aData protection. 615 0$aComputer crimes. 615 0$aCooperating objects (Computer systems) 615 14$aData and Information Security. 615 24$aCybercrime. 615 24$aCyber-Physical Systems. 676 $a364.168 676 $a005.8 702 $aNeittaanma?ki$b P$g(Pekka), 702 $aLehto$b Martti 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910558483803321 996 $aCyber Security$91897917 997 $aUNINA