Advanced sciences and technologies for security applications
Includes bibliographical references.
Intro; Contents; Part I Governance & Risk Management; Resilience Approach to Critical Information Infrastructures; 1 Introduction; 2 Definitions; 3 Analysis of CI, CII and NIS Policies and CII Elements; 4 Conceptual Model; 5 Conclusion and Recommendations; References; Methodologies and Strategies for Critical Infrastructure Protection; 1 Introduction; 2 Methodologies for Identifying and Evaluating Critical Infrastructures (CIs); 2.1 Critical Infrastructure Identification; 2.1.1 Identification of Critical Sectors/Subsectors; 2.1.2 Identification of Critical Services
2.2 Dependencies and Interdependencies2.3 Criteria for Critical Service/Infrastructure Assessment; 2.3.1 Sectorial Criteria; 2.3.2 Cross-Cutting Criteria; 2.3.3 Combination of Sectoral and Cross-Cutting Criteria; 3 Best Practices in European Countries; 3.1 France; 3.2 Germany; 3.3 Great Britain; 4 United States of America (USA); 5 Critical Infrastructure Protection Strategy; 6 Conclusions; References; Risk Analysis for Critical Infrastructure Protection; 1 Introduction; 2 What Is Critical Infrastructure?; 3 Critical Infrastructure Protection; 4 NIPP & RMF; 5 RAMCAP; 6 DWRP; 7 LIRA
8 Are We There Yet?9 Conclusion; References; Risk-Based Analysis of the Vulnerability of Urban Infrastructure to the Consequences of Climate Change; 1 Introduction; 2 Risk and Vulnerability Assessments -- Essential Concepts; 3 State of the Art; 4 The RESIN Project -- Overview; 5 Risk-Based Vulnerability Assessment: IVAVIA; 5.1 Qualitativ Stage; 5.2 Quantitative Stage; 5.3 Presentation; 5.4 Supporting IT Tools; 6 The RESIN City Case Studies; 7 IVAVIA Results for RESIN Cities; 8 Climate Change-Related Risk to Critical Infrastructures; 9 Conclusion; References
Game-Theoretic Decision Making for the Resilience of Interdependent Infrastructures Exposed to Disruptions1 Introduction; 2 Operational Models of Interdependent Infrastructures; 2.1 Optimization-Based System Operation Model; 2.2 Infrastructure Interdependency Model; 3 System Resilience Under Disruptions; 3.1 Impact Models of Disruptions; 3.2 Resilience Assessment; 3.3 Resilience Improvement; 4 Numerical Example; 5 Concluding Remarks; References; Smallest Pseudo Target Set Identification and Related Problems Using the Implicative Interdependency Model; 1 Introduction; 2 Related Work
0
8
8
8
This book presents the latest trends in attacks and protection methods of Critical Infrastructures. It describes original research models and applied solutions for protecting major emerging threats in Critical Infrastructures and their underlying networks. It presents a number of emerging endeavors, from newly adopted technical expertise in industrial security to efficient modeling and implementation of attacks and relevant security measures in industrial control systems; including advancements in hardware and services security, interdependency networks, risk analysis, and control systems security along with their underlying protocols. Novel attacks against Critical Infrastructures (CI) demand novel security solutions. Simply adding more of what is done already (e.g. more thorough risk assessments, more expensive Intrusion Prevention/Detection Systems, more efficient firewalls, etc.) is simply not enough against threats and attacks that seem to have evolved beyond modern analyses and protection methods. The knowledge presented here will help Critical Infrastructure authorities, security officers, Industrial Control Systems (ICS) personnel and relevant researchers to (i) get acquainted with advancements in the field, (ii) integrate security research into their industrial or research work, (iii) evolve current practices in modeling and analyzing Critical Infrastructures, and (iv) moderate potential crises and emergencies influencing or emerging from Critical Infrastructures.