Critical Infrastructure Security: Assessment, Prevention, Detection, Response

Author:   Francesco Flammini
Publisher:   WIT Press
ISBN:  

9781845645625


Pages:   326
Publication Date:   31 May 2011
Format:   Hardback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $403.65 Quantity:  
Add to Cart

Share |

Critical Infrastructure Security: Assessment, Prevention, Detection, Response


Add your own review!

Overview

This book provides a comprehensive survey of state-of-the-art techniques for the security of critical infrastructures, addressing both logical and physical aspects from an engineering point of view. Recently developed methodologies and tools for CI analysis as well as strategies and technologies for CI protection are investigated in the following strongly interrelated and multidisciplinary main fields: - Vulnerability analysis and risk assessment - Threat prevention, detection and response - Emergency planning and management Each of the aforementioned topics is addressed considering both theoretical aspects and practical applications. Emphasis is given to model-based holistic evaluation approaches as well as to emerging protection technologies, including smart surveillance through networks of intelligent sensing devices. Critical Infrastructure Security can be used as a self-contained reference handbook for both practitioners and researchers or even as a textbook for master/doctoral degree students in engineering or related disciplines.More specifically, the topic coverage of the book includes: - Historical background on threats to critical infrastructures - Model-based risk evaluation and management approaches - Security surveys and game-theoretic vulnerability assessment - Federated simulation for interdependency analysis - Security operator training and emergency preparedness - Intelligent multimedia (audio-video) surveillance - Terahertz body scanners for weapon and explosive detection - Security system design (intrusion detection / access control) - Dependability and resilience of computer networks (SCADA / cyber-security) - Wireless smart-sensor networks and structural health monitoring - Information systems for crisis response and emergency management - Early warning, situation awareness and decision support software

Full Product Details

Author:   Francesco Flammini
Publisher:   WIT Press
Imprint:   WIT Press
ISBN:  

9781845645625


ISBN 10:   1845645626
Pages:   326
Publication Date:   31 May 2011
Audience:   College/higher education ,  Postgraduate, Research & Scholarly
Format:   Hardback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Contents Fundamentals of Security Risk and Vulnerability Assessment Model-based risk analysis for critical infrastructures; Introduction; The critical infrastructure problem; Tools; Multi-criterion tools (CARVER and MSRAM); CARVER; MSRAM; CI/KR as a Network; MBRA; KDAS; Resource allocation; Network science; An illustration; Conclusion; Physical vulnerability assessment; Introduction; Terminology; What a VA is not; Common techniques for finding vulnerabilities; Security Survey; Security Audit; Design Basis Threat (DBT); CARVER Method; Delphi Method; Fault Tree Analysis; Software tools; Adversarial Vulnerability Assessments; VA best practices; VA personnel; Brainstorming; Common security mistakes; The VA report: Delivering the bad news ; Vulnerability myths and mistakes Part II Modeling and Simulation Tools for Critical Infrastructures; Modeling and simulation of critical infrastructures; Introduction; Interdependency modelling; Holistic approaches; Critical Infrastructures as Complex Systems; Topological analysis; Functional analysis; Simulative approaches; Agent-based approaches; Multilayer approaches; Conclusions; Graphical formalisms for modelling critical infrastructures; Introduction; Requirements for CI modelling and simulation; Graphical formalisms for CI modelling and simulation; Graph-based techniques; Petri Nets (PNs); General simulation environments; Agent-based modelling and simulation; Discussion of requirements; Practical experiences in modelling CIs: meeting the requirements with SAN; CRUTIAL and HIDENETS: a brief introduction; On the usage of SAN to match requirement R4; On the usage of SAN to match requirement R6; Conclusions; Semantic interoperability among federated simulators of critical infrastructures - DIESIS project; Introduction; Related works and initiatives; DIESIS project; Managerial, legal and economic features; Technical features; Conclusion; Game theory in infrastructure security; Introduction; Game-theoretic models; Simultaneous AD games; Sequential DA games; Sequential AD games; Sequential DAD games; Simultaneous DD games; Limitations of game-theoretic models; Conclusion Part III Cybersecurity in Information and SCADA Systems Modelling, measuring and managing information technology risks; Introduction; What is risk with respect to information systems?; Threats; Vulnerabilities; Why is it important to manage risk?; Managing risk at the organizational level; How is risk assessed?; Quantitative risk assessment'; Qualitative risk assessment; How is risk managed?; Strategies for managing individual risks; High-level risk management strategies; Communicating risks and risk management strategies; Implementing risk management strategies; What are some common risk assessment/management methodologies and tools?; NIST methodology; OCTAVE(R); FRAP; GRC tools; Summary; Trustworthiness evaluation of critical information infrastructures; Introduction; Dependability and security evaluation approaches; A taxonomy for evaluation approaches; Common evaluation approaches and applications; On the evaluation of Financial Infrastructure Protection (FIP); FCI: Trustworthiness evaluation trends; FIP trustworthiness requirements and key components; FIP example: CoMiFin as a FCI wrapper; Metric-based FIP trustworthiness evaluation; On the evaluation of CIIP; Design requirements for CIIP; Peer-to-Peer (P2P)-based CIIP; Mitigation strategy for node crashes; Mitigation strategy for illicit SCADA data modification; Evaluation of P2P-based CIIP; Conclusion; Network resilience; Introduction; A component-based framework for improving network resilience in CIs; Intrusion detection and reaction in satellite networks; Detection and remediation of a distributed attack over an IP-based network; Diagnosis-driven reconfiguration of WSNs; Conclusions; Wireless sensor networks for critical infrastructure protection; Introduction; Security threat analysis; Adversary models; Risk assessment; Survey of the state of the art; Sensor node protection; Dependable sensor networking; Dependable sensor network services; Conclusions and identification of further research topics Part IV Monitoring and Surveillance Technologies Intelligent video surveillance; Introduction; Architecture of an IVS system; Examples of applications; LAICA project; THIS project; Other examples; Conclusions; Audio surveillance; Introduction; Sound recognition for audio surveillance; A representative picture of the related literature; Evaluation of audio surveillance frameworks; Privacy; Conclusion; Terahertz for weapon and explosive detection; Introduction; Terahertz technology; Overview; THz systems; Terahertz for weapons detection; Terahertz for explosive detection; Discussion; Structural health monitoring; Introduction; Structural evaluation; Sensor selection; Accelerometers; Strain sensors; Tilt sensors; Displacement sensors; Corrosion sensors; Fiber Bragg Gratings (FBGs); Acoustic emission sensors; Additional technologies; System design and integration; Data acquisition; Review and interpretation of the data; Summary; Networks of simple sensors for detecting emplacement of improvised explosive devices; Introduction; Clues to IED emplacement; Cameras versus nonimaging sensors; Prior probabilities for emplacement; Anomalous behaviour; Goal changing and coordinated activity; Sensor management; Experiments; Conclusions Part V Security Systems Integration and Alarm Management Security systems design and integration; Introduction; The intrusion detection system; Sensors; Internal sensors; External sensors; The access control system; The video surveillance system; The communication network; Integration of security systems: The supervision and control system; Conclusions; Multisource information fusion for critical infrastructure situation awareness; Introduction; Joint Directors of Laboratories (JDL) data fusion process model; Comments on the state of the art; Human-centric information fusion; Implications for infrastructure situation awareness; Summary; Simulation-based learning in the physical security industry; Introduction; Simulation overview; Security simulation; Security simulation domains; Computation simulators; Interactive simulation; Simulation in a training environment; Systematic approach to training for simulation; Interactive simulators and simulation learning theory; Learning retention; Security simulation and vulnerability assessment; Historical adoption curve of use of simulators; Conclusion; Frameworks and tools for emergency response and crisis management; Introduction; CATS; CATS architecture; Model descriptions; Consequence assessment; Summary and conclusions

Reviews

Author Information

Prof. Francesco FLAMMINI (Ph.D., Computer Science, University of Naples Federico II) is an Adjunct Professor of Software Engineering and Computer Science at the University of Naples Federico II , ITALY From October 2003 through January 2007, he worked at Ansaldo STS as a Software/RAMS Engineer in the Verification & Validation unit and was involved in several European Railway Traffic Management System / European Train Control System projects, specializing in functional testing of critical control systems. Since February 2007, after moving to the Innovation & Competitiveness unit, he has won several company awards for his work on critical infrastructure protection, transportation security and several interdisciplinary research projects. The author of more than 35 scientific papers published in international journals, book chapters and conference proceedings, his main research interests are the dependability and security of critical systems and infrastructures, including multi-paradigm modeling approaches. He is Editor in Chief of the International Journal of Critical Computer-Based Systems (Inderscience Publishers). He has served as a chairman, a member of the International Program Committee and a reviewer for several international conferences and IEEE journals. He is Vice-Chair of the IEEE Computer Society Italy and participates on several Technical Committees, including Software Engineering and Fault Tolerant Computing. He is also a member of the European Workshop on Industrial Computer Systems Reliability, Safety and Security (EWICS TC7), FME (Formal Methods Europe), ERCIM Working Group on Formal Methods for Industrial Critical Systems (FMICS), ESRA TC on Operational Safety and Security of Interconnected Critical Infrastructures, and IEEE SMC TC on Homeland Security.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

wl

Shopping Cart
Your cart is empty
Shopping cart
Mailing List