Critical infrastructure security : assessment, prevention, detection, response /
edited by Francesco Flammini.
- Southampton ; Boston : WIT Press, c2012.
- 303 p. : ill. ; 25 cm.
- Information & communication technologies .
Contents PART I: Fundamentals of security risk and Vulnerability Assessment 1: Model-based risk analysis for critical infrastructures 1. Introduction 2. The critical infrastructure problem 3. Tools 4. Multi-criterion tools (CARVER and MSRAM) 5. CI/KR as a network Etc.
2: Physical vulnerability assessment 1. Introduction 2. Common techniques for finding vulnerabilities 3. VA best practices 4. Vulnerability myths and mistakes
PART II: Modelling and simulation Tools for critical infrastructures 3: Modelling and simulation of critical infrastructures 1.Introduction 2.Interdependency modelling 3.Holistic Approaches 4.Critical infrastructures as complex systems 5.Simulative approaches Etc.
4:Graphical formalism for modelling critical infrastructures 1.Introduction 2.Requirements for CI modelling and simulation 3.Graphical formalisation for CI modelling and simulation 4.Practical Experiences in modelling CIs: meeting the requirements with SAN 5.Conclusions
5: Sematic interoperability among federated simulators of critical infrastructures-DIESIS project 1.Introduction 2.Related works and initiatives 3.DIESIS project 4.Conclusion Etc.
6: Game theory in infrastructure security 1.Introduction 2.Game-theoretic models 3.Limitations of game-theoretic models 4.Conclusion Etc.
PART III: Cybersecurity in Information and SCADA Systems 7: Modelling, measuring and managing information technology risks 1.Introduction 2.What is risk with respect to information systems? 3.Why is it important to manage risk? 4.Managing risk at organizational level 5.How is risk assessed? Etc.
8: trustworthiness evaluation of critical information infrastructures 1.Introduction 2.Dependability and security evaluation approaches 3.On the evaluation of Financial Infrastructure protection (FIP) 4.On the evaluation of CIIP 5.Conclusion Etc.
9: Network resilience 1.Introduction 2.A component-based framework for improving network resilience in CIs 3.Intrusion detection and reaction in satellite networks 4.Detection and remediation of a distributed attack over an IP-based network 5.Diagnosis-driven reconfiguration of WSNs Etc.
10: Wireless sensor networks for critical infrastructure protection 1.Introduction 2.Security threat analysis 3.Survey of the state of the art 4.Conclusions and identification of further research topics
PART IV: Monitoring and Surveillance Technologies 11: Intelligent video surveillance 1.Introduction 2.Architecture of an IVS system 3.Examples of applications Etc.
12: Audio Surveillance 1.Introduction 2.Sound recognition for audio surveillance 3.A representative picture of the related literature Etc.
13: Terahertz for weapon and explosive detection 1.Introduction 2.Terahertz technology 3.Terahertz for weapon detection Etc.