Shopping Cart | Login | Register | Language: English

Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection

Release Date: December, 2012. Copyright © 2013. 450 pages.
Select a Format:
Hardcover
$156.00
List Price: $195.00
Current Promotions:
20% Online Bookstore Discount*
In Stock. Have it as soon as Nov. 4 with express shipping*.
DOI: 10.4018/978-1-4666-2659-1, ISBN13: 9781466626591, ISBN10: 1466626593, EISBN13: 9781466626904
Cite Book

MLA

Laing, Christopher, Atta Badii, and Paul Vickers. "Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection." IGI Global, 2013. 1-450. Web. 30 Oct. 2014. doi:10.4018/978-1-4666-2659-1

APA

Laing, C., Badii, A., & Vickers, P. (2013). Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection (pp. 1-450). Hershey, PA: IGI Global. doi:10.4018/978-1-4666-2659-1

Chicago

Laing, Christopher, Atta Badii, and Paul Vickers. "Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection." 1-450 (2013), accessed October 30, 2014. doi:10.4018/978-1-4666-2659-1

Export Reference

Mendeley
Favorite
Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection
Access on Platform
Browse by Subject
Top

Description

The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical.

Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyzes the technical, procedural, and managerial responses to securing these systems.

Top

Table of Contents and List of Contributors

Search this Book: Reset
Table of Contents
Preface
Christopher Laing, Atta Badii, Paul Vickers
Chapter 1
David Brooks
Intelligent Buildings (IB) are facility-wide systems that connect, control, and monitor the plant and equipment of a facility. The aim of IB is to... Sample PDF
Security Threats and Risks of Intelligent Building Systems: Protecting Facilities from Current and Emerging Vulnerabilities
$30.00
List Price: $37.50
Chapter 2
Maurilio Pereira Coutinho, Germano Lambert-Torres, Luiz Eduardo Borges da Silva, Horst Lazarek, Elke Franz
Nowadays, critical infrastructure plays a fundamental role in our modern society. Telecommunication and transportation services, water and... Sample PDF
Detecting Cyber Attacks on SCADA and Other Critical Infrastructures
$30.00
List Price: $37.50
Chapter 3
Bill Bailey, Robert Doleman
The belief that a static alarm system will safeguard critical infrastructure without additional support mechanisms is misplaced. This complacency is... Sample PDF
Proactive Security Protection of Critical Infrastructure: A Process Driven Methodology
$30.00
List Price: $37.50
Chapter 4
Antony Bridges
As industrial control systems (ICSs) have been connected to wider organisational networks and the Internet, the threat from unauthorised access has... Sample PDF
Industrial Control Systems: The Human Threat
$30.00
List Price: $37.50
Chapter 5
Rafal Leszczyna, Elyoenai Egozcue
In 2011, the European Network and Information Security Agency (ENISA) conducted a study in the domain of Industrial Control Systems (ICS). Its... Sample PDF
ENISA Study: Challenges in Securing Industrial Control Systems
$30.00
List Price: $37.50
Chapter 6
Matthew Brundage, Anastasia Mavridou, James Johnson, Peter J. Hawrylak, Mauricio Papa
SCADA systems monitor and control many critical installations around the world, interpreting information gathered from a multitude of resources to... Sample PDF
Distributed Monitoring: A Framework for Securing Data Acquisition
$30.00
List Price: $37.50
Chapter 7
Sean Lawson
Based on an analysis of key policy documents and statements from civilian policymakers, military leaders, and cybersecurity experts, this chapter... Sample PDF
Motivating Cybersecurity: Assessing the Status of Critical Infrastructure as an Object of Cyber Threats
$30.00
List Price: $37.50
Chapter 8
Konstantin Knorr
Worm epidemics such as Stuxnet and Conficker have raised great interest in the public and media lately and stressed the question of how our critical... Sample PDF
Patching our Critical Infrastructure: Towards an Efficient Patch and Update Management for Industrial Control Systems
$30.00
List Price: $37.50
Chapter 9
ICS Software Protection  (pages 217-239)
Peter H. Jenney
Industrial Control System (ICS) cyber security is weak and exploitable. As evidenced by STUXNET’s attack on the Iranian Natanz1 nuclear facility in... Sample PDF
ICS Software Protection
$30.00
List Price: $37.50
Chapter 10
Ian Ellefsen, Sebastiaan von Solms
Developing countries are fast becoming players in an increasingly interconnected world. Many developing countries are making use of technological... Sample PDF
A Community-Oriented Approach to CIIP in Developing Countries
$30.00
List Price: $37.50
Chapter 11
Eduardo E. Gelbstein
Critical Information Infrastructure Infrastructures (CII) have been recognized as potential targets for cyber-attacks since the late 1990s and many... Sample PDF
Designing a Security Audit Plan for a Critical Information Infrastructure (CII)
$30.00
List Price: $37.50
Chapter 12
Stig O. Johnsen
This chapter describes vulnerabilities related to safety and security in distributed process control systems integrated with information and... Sample PDF
Safety and Security in SCADA Systems Must be Improved through Resilience Based Risk Management
$30.00
List Price: $37.50
Chapter 13
Alan T. Murray, Tony H. Grubesic
Large scale, geospatial networks—such as the Internet, the interstate highway system, gas pipelines, and the electrical grid—are integral parts of... Sample PDF
Fortifying Large Scale, Geospatial Networks: Implications for Supervisory Control and Data Acquisition Systems
$30.00
List Price: $37.50
Chapter 14
Neil Robinson
This chapter describes and contrasts policy, economic theory, and insights concerning the establishment and operation of Information Exchanges (IE).... Sample PDF
Information Sharing for CIP: Between Policy, Theory, and Practice
$30.00
List Price: $37.50
Chapter 15
Bonnie Zhu, Shankar Sastry
Designed without cyber security in mind, most existing Supervisory Control And Data Acquisition (SCADA) systems make it a big challenge to modify... Sample PDF
Intrusion Detection and Resilient Control for SCADA Systems
$30.00
List Price: $37.50
Top

Reviews and Testimonials

While there are numerous benefits to be gained from the gradual convergence of cloud services, smart grid (the evolving intelligent electric grid), and mobile telecommunications, the changes they bring to the technology environment also open up that environment to new security vulnerabilities. In response, the contributors explore critical infrastructure, mitigation of and protection against attacks, and failure-recovery emergency response policy creation at both national and international levels. Topics addressed include: security threats and risks of intelligent building systems, detecting cyber attacks on SCADA (supervisory control and data acquisition) and other critical infrastructures, industrial control systems, assessing critical infrastructure in terms of cyber threats and protections, designing a security audit plan, fortifying large-scale networks, and more. Editors are Laing and Vickers (Northumbria U., UK), Badii (U. of Reading, UK).

– Annotation ©2013 Book News Inc. Portland, OR
Top

Topics Covered

  • Critical Infrastructures
  • Industrial Control Systems
  • Risk Analysis and Assessment
  • SCADA systems
  • Security
  • Security Testing
  • Supervisory Control And Data Acquisition (SCADA)
  • Threat Protection
Top

Author(s)/Editor(s) Biography

Christopher Laing is the Project Director of the nuWARP, Northumbria University, a not-forprofit organization, part of the UK government’s Centre for the Protection of National Infrastructure initiative on securing data and network information infrastructures. He is also a consultant for the European Network & Information Security Agency, and he has worked with UK law enforcement agencies in the development of postgraduate computer forensics/digital security programmes. His research is focused on network infrastructures, in particular how the behaviour of complex network infrastructures may be used as a self-adapting defence mechanism.
Atta Badii is a high ranking Professor at the University of Reading, UK (Chair of Secure Pervasive Technologies). He has a track record of over 20 years of trans-disciplinary academic and industrial research contributions in systems engineering; rooted in the disciplines that contribute to socially responsible and inclusive innovation of security-privacy-aware ICT to serve pervasive-assistive technologies. This work has resulted in solution innovation involving a convergence of mobile telecommunication with emergent internet, cloud services, and, intelligent media technologies in smart environments. Such smart environments are to enable fluid availability and inter-operability of assistive services and digital media content to meet the needs of various life-styles and work-styles everywhere (as people interact securely with their personal real-digital-virtual worlds within the globalised “Internet-of-People-Things-Services”).
Paul Vickers is a UK Chartered Engineer with a BSc degree in Computer Studies and a PhD in Software Engineering & HCI. He is currently Reader in Computer Science at Northumbria University. His research is in the computing domain where it intersects with creative digital media with a particular emphasis on auditory display and how audio may be used in visualization for security applications.