Format:
Online Ressource
Edition:
Online-Ausg.
ISBN:
0124158153
,
9780124159105
,
0124159109
,
9780124158153
,
1283434245
Content:
Introduction: Securing Cyber-Physical Infrastructures--An Overview Part 1: Theoretical Foundations of Security Chapter 1: Security and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-Theoretic Approach Chapter 2: Game Theory for Infrastructure Security -- The Power of Intent-Based Adversary Models Chapter 3: An Analytical Framework for Cyber-Physical Networks Chapter 4: Evolution of Widely Spreading Worms and Countermeasures : Epidemic Theory and Application Part 2: Security for Wireless Mobile Networks Chapter 5: Mobile Wireless Network Security Chapter 6: Robust Wireless Infrastructure against Jamming Attacks Chapter 7: Security for Mobile Ad Hoc Networks Chapter 8: Defending against Identity-Based Attacks in Wireless Networks Part 3: Security for Sensor Networks Chapter 9: Efficient and Distributed Access Control for Sensor Networks Chapter 10: Defending against Physical Attacks in Wireless Sensor Networks Chapter 11: Node Compromise Detection in Wireless Sensor Networks Part 4: Platform Security Chapter 12: Hardware and Security: Vulnerabilities and Solutions Chapter 13: Languages and Security: Safer Software Through Language and Compiler Techniques Part 5: Cloud Computing and Data Security Chapter 14: Protecting Data in Outsourcing Scenarios Chapter 15: Data Security in Cloud Computing Chapter 16: Secure Mobile Cloud Computing Chapter 17: Relation Privacy Preservation in Online Social Networks Part 6: Event Monitoring and Situation Awareness Chapter 18: Distributed Network and System Monitoring for Securing Cyber-Physical Infrastructure Chapter 19: Discovering and Tracking Patterns of Interest in Security Sensor Streams Chapter 20: Pervasive Sensing and Monitoring for Situational Awareness Chapter 21: Sense and Response Systems for Crisis Management Part 7. Policy Issues in Security Management Chapter 22: Managing and Securing Critical Infrastructure -- A Semantic Policy and Trust-Driven Approach Chapter 23: Policies, Access Control, and Formal Methods Chapter 24: Formal Analysis of Policy based Security Configurations in Enterprise Networks Part 8: Security Issues in Real-World Systems Chapter 25: Security and Privacy in the Smart Grid Chapter 26: Cyber-physical Security of Automotive Information Technology Chapter 27: Security and Privacy for Mobile Healthcare (m-Health) Systems Chapter 28: Security and Robustness in the Internet Infrastructure Chapter 29: Emergency Vehicular Networks Chapter 30: Security Issues in VoIP Telecommunication Networks
Content:
The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques - while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system. *Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios *Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on. *Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout
Note:
Includes bibliographical references and index. - Description based on print version record
,
Front Cover; Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges; Copyright; Dedication; About the Authors; Table of Contents; Contributors; Foreword; Securing Cyber-Physical Infrastructure: Perspectives and Overview of the Handbook; I-1 Introduction; I-2 Scope of the Handbook; I-3 Overview of the Handbook; I-3.1 Part I: Theoretical Foundations; I-3.2 Part II: Security for Wireless Mobile Networks; I-3.3 Part III: Security for Sensor Networks; I-3.4 Part IV: Platform Security; I-3.5 Part V: Cloud Computing and Data Security
,
I-3.6 Part VI: Event Monitoring and Situation AwarenessI-3.7 Part VII: Policy Issues in Security Management; I-3.8 Part VIII: Security Issues in Real-World Systems; I-4 How to Use The Handbook; I-4.1 Advanced Undergraduate or Graduate Course; I-4.2 A Training Course; Acknowledgements; I Theoretical Foundations; References; 1 Security and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-TheoreticApproach; 1.1 Introduction; 1.2 Definitions for Security and Vulnerability of Network Dynamics; 1.2.1 Review: Differential Equation Models for Infrastructure Networks
,
1.2.2 Defining Security Measures for the Dynamical Network Example1.2.3 Definitions of Vulnerability for Infrastructure Network Dynamics; A Model for Attacks; Measuring the Impact of Attacks; Defining Vulnerability; 1.2.4 Integrated Analysis: Prevention, Attack, and Mitigation Together; Scenario 1: Attack Design by Adversaries; Scenario 2: Prevention of Large-Impact Attacks; Scenario 3: Attack Detection/Mitigation and Stealth; 1.2.5 An Illustrative Example; 1.3 Network Control Tools for Characterizing and Designing Security and Vulnerability; 1.3.1 Tools for Network Inference
,
Initial-Condition Estimation on a Laplacian Network SystemSteady-State Probability Estimation for an Ergodic Markov Chain; Spectrum Estimation in a Laplacian Network; 1.3.2 Tools for Modeling Environmental Uncertainties; 1.3.3 Graph-Theoretic Tools for Network Control and Design; 1.3.4 Tools for Control-Theoretic Feature-Based Partitioning; 1.4 Conclusions and Future Work; Exercises; References; 2 Game Theory for Infrastructure Security: The Power of Intent-Based Adversary Models; 2.1 Introduction; 2.1.1 Motivation in Anomaly Detection; 2.1.2 Motivation in Anonymous Communication Systems
,
2.1.3 Technical ResultsAnomaly Detection; Anonymous Communication Systems; 2.2 Preliminaries; 2.2.1 Game Theory Basics; Overview; Model of Intent: Utility Function (Payoff); Nash Equilibrium; Taxonomy of Games; Strategic Game; Extensive Game; 2.2.2 Anomaly Detection Basics; 2.2.3 Anonymous Communication Basics; 2.3 Intent-based Adversary Model for Anomaly Detection; 2.3.1 An Intent-Based View of Participating Parties: Smart Insiders, Naïve Attackers, and the Defender; Smart Insiders; Naïve Attackers; Defender; 2.3.2 Formal Game-Theoretic Formulation; Defender's Reputation
,
2.3.3 Power of Intent-Based Adversary Model: Maintaining Defender's Reputation in Anomaly Detection
,
Introduction: Securing Cyber-Physical Infrastructures--An Overview Part 1: Theoretical Foundations of Security Chapter 1: Security and Vulnerability of Cyber-Physical Infrastructure Networks: A Control-Theoretic Approach Chapter 2: Game Theory for Infrastructure SecurityThe Power of Intent-Based Adversary Models Chapter 3: An Analytical Framework for Cyber-Physical Networks Chapter 4: Evolution of Widely Spreading Worms and Countermeasures : Epidemic Theory and Application Part 2: Security for Wireless Mobile Networks Chapter 5: Mobile Wireless Network Security Chapter 6: Robust Wireless Infrastructure against Jamming Attacks Chapter 7: Security for Mobile Ad Hoc Networks Chapter 8: Defending against Identity-Based Attacks in Wireless Networks Part 3: Security for Sensor Networks Chapter 9: Efficient and Distributed Access Control for Sensor Networks Chapter 10: Defending against Physical Attacks in Wireless Sensor Networks Chapter 11: Node Compromise Detection in Wireless Sensor Networks Part 4: Platform Security Chapter 12: Hardware and Security: Vulnerabilities and Solutions Chapter 13: Languages and Security: Safer Software Through Language and Compiler Techniques Part 5: Cloud Computing and Data Security Chapter 14: Protecting Data in Outsourcing Scenarios Chapter 15: Data Security in Cloud Computing Chapter 16: Secure Mobile Cloud Computing Chapter 17: Relation Privacy Preservation in Online Social Networks Part 6: Event Monitoring and Situation Awareness Chapter 18: Distributed Network and System Monitoring for Securing Cyber-Physical Infrastructure Chapter 19: Discovering and Tracking Patterns of Interest in Security Sensor Streams Chapter 20: Pervasive Sensing and Monitoring for Situational Awareness Chapter 21: Sense and Response Systems for Crisis Management Part 7. Policy Issues in Security Management Chapter 22: Managing and Securing Critical Infrastructure -- A Semantic Policy and Trust-Driven Approach Chapter 23: Policies, Access Control, and Formal Methods Chapter 24: Formal Analysis of Policy based Security Configurations in Enterprise Networks Part 8: Security Issues in Real-World Systems Chapter 25: Security and Privacy in the Smart Grid Chapter 26: Cyber-physical Security of Automotive Information Technology Chapter 27: Security and Privacy for Mobile Healthcare (m-Health) Systems Chapter 28: Security and Robustness in the Internet Infrastructure Chapter 29: Emergency Vehicular Networks Chapter 30: Security Issues in VoIP Telecommunication Networks.
Additional Edition:
ISBN 1283434245
Additional Edition:
Erscheint auch als Druck-Ausgabe Handbook on securing cyber-physical critical infrastructure Waltham, MA : Morgan Kaufmann, c2012
Language:
English
Keywords:
Electronic books
;
Electronic books