Amazon cover image
Image from Amazon.com

Critical infrastructure security : assessment, prevention, detection, response / edited by Francesco Flammini.

Contributor(s): Series: Information & communication technologiesPublication details: Southampton ; Boston : WIT Press, c2012.Description: 303 p. : ill. ; 25 cmISBN:
  • 9781845645625 (hbk.)
  • 9781845645632
  • 1845645626 (hbk.)
Subject(s): DDC classification:
  • 006.8 22 CRI
LOC classification:
  • QA76.9.A25 C748 2012
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Book Open Access Book Open Access Engineering Library 006.8 CRI (Browse shelf(Opens below)) 1 Available BUML23080401
Book Open Access Book Open Access Engineering Library 006.8 CRI (Browse shelf(Opens below)) 2 Available BUML23080402

Contents
PART I: Fundamentals of security risk and Vulnerability Assessment
1: Model-based risk analysis for critical infrastructures
1. Introduction
2. The critical infrastructure problem
3. Tools
4. Multi-criterion tools (CARVER and MSRAM)
5. CI/KR as a network
Etc.

2: Physical vulnerability assessment
1. Introduction
2. Common techniques for finding vulnerabilities
3. VA best practices
4. Vulnerability myths and mistakes

PART II: Modelling and simulation Tools for critical infrastructures
3: Modelling and simulation of critical infrastructures
1.Introduction
2.Interdependency modelling
3.Holistic Approaches
4.Critical infrastructures as complex systems
5.Simulative approaches
Etc.

4:Graphical formalism for modelling critical infrastructures
1.Introduction
2.Requirements for CI modelling and simulation
3.Graphical formalisation for CI modelling and simulation
4.Practical Experiences in modelling CIs: meeting the requirements with SAN
5.Conclusions

5: Sematic interoperability among federated simulators of critical infrastructures-DIESIS project
1.Introduction
2.Related works and initiatives
3.DIESIS project
4.Conclusion
Etc.

6: Game theory in infrastructure security
1.Introduction
2.Game-theoretic models
3.Limitations of game-theoretic models
4.Conclusion
Etc.

PART III: Cybersecurity in Information and SCADA Systems
7: Modelling, measuring and managing information technology risks
1.Introduction
2.What is risk with respect to information systems?
3.Why is it important to manage risk?
4.Managing risk at organizational level
5.How is risk assessed?
Etc.

8: trustworthiness evaluation of critical information infrastructures
1.Introduction
2.Dependability and security evaluation approaches
3.On the evaluation of Financial Infrastructure protection (FIP)
4.On the evaluation of CIIP
5.Conclusion
Etc.

9: Network resilience
1.Introduction
2.A component-based framework for improving network resilience in CIs
3.Intrusion detection and reaction in satellite networks
4.Detection and remediation of a distributed attack over an IP-based network
5.Diagnosis-driven reconfiguration of WSNs
Etc.

10: Wireless sensor networks for critical infrastructure protection
1.Introduction
2.Security threat analysis
3.Survey of the state of the art
4.Conclusions and identification of further research topics

PART IV: Monitoring and Surveillance Technologies
11: Intelligent video surveillance
1.Introduction
2.Architecture of an IVS system
3.Examples of applications
Etc.

12: Audio Surveillance
1.Introduction
2.Sound recognition for audio surveillance
3.A representative picture of the related literature
Etc.

13: Terahertz for weapon and explosive detection
1.Introduction
2.Terahertz technology
3.Terahertz for weapon detection
Etc.

14:Structural health monitoring
1. introduction
2. structural evaluation
3. sensor selection, etc

15: Networks of simple sensors foe detecting emplacement of improvised explosive devices
1. clues to IED emplacement
2. sensor management
3. experiments, etc

Part V Security systems integration and Alarm Management

16 : Security systems, Design and Integration

17. multisource information fusion for critical infrastructure situation awareness

18 Simulation-Based learning in the physical security industry

19. Frameworks and tools for imergence response and crisis management


Includes bibliographical references.

There are no comments on this title.

to post a comment.