Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection

Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection

Christopher Laing (Northumbria University, UK), Atta Badii (University of Reading, UK) and Paul Vickers (Northumbria University, UK)
Indexed In: Clarivate Analytics, SCOPUS View 1 More Indices
Release Date: December, 2012|Copyright: © 2013 |Pages: 450
ISBN13: 9781466626591|ISBN10: 1466626593|EISBN13: 9781466626904|DOI: 10.4018/978-1-4666-2659-1

Description

The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical.

Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyzes the technical, procedural, and managerial responses to securing these systems.

Topics Covered

The many academic areas covered in this publication include, but are not limited to:

  • Critical Infrastructures
  • Industrial Control Systems
  • Risk Analysis and Assessment
  • SCADA systems
  • Security
  • Security Testing
  • Supervisory Control And Data Acquisition (SCADA)
  • Threat Protection

Reviews and Testimonials

While there are numerous benefits to be gained from the gradual convergence of cloud services, smart grid (the evolving intelligent electric grid), and mobile telecommunications, the changes they bring to the technology environment also open up that environment to new security vulnerabilities. In response, the contributors explore critical infrastructure, mitigation of and protection against attacks, and failure-recovery emergency response policy creation at both national and international levels. Topics addressed include: security threats and risks of intelligent building systems, detecting cyber attacks on SCADA (supervisory control and data acquisition) and other critical infrastructures, industrial control systems, assessing critical infrastructure in terms of cyber threats and protections, designing a security audit plan, fortifying large-scale networks, and more. Editors are Laing and Vickers (Northumbria U., UK), Badii (U. of Reading, UK).

– Annotation ©2013 Book News Inc. Portland, OR

Table of Contents and List of Contributors

Search this Book:
Reset

Author(s)/Editor(s) Biography

Christopher Laing is the Project Director of the nuWARP, Northumbria University, a not-forprofit organization, part of the UK government’s Centre for the Protection of National Infrastructure initiative on securing data and network information infrastructures. He is also a consultant for the European Network & Information Security Agency, and he has worked with UK law enforcement agencies in the development of postgraduate computer forensics/digital security programmes. His research is focused on network infrastructures, in particular how the behaviour of complex network infrastructures may be used as a self-adapting defence mechanism.
Atta Badii is a high ranking Professor at the University of Reading, UK (Chair of Secure Pervasive Technologies). He has a track record of over 20 years of trans-disciplinary academic and industrial research contributions in systems engineering; rooted in the disciplines that contribute to socially responsible and inclusive innovation of security-privacy-aware ICT to serve pervasive-assistive technologies. This work has resulted in solution innovation involving a convergence of mobile telecommunication with emergent internet, cloud services, and, intelligent media technologies in smart environments. Such smart environments are to enable fluid availability and inter-operability of assistive services and digital media content to meet the needs of various life-styles and work-styles everywhere (as people interact securely with their personal real-digital-virtual worlds within the globalised “Internet-of-People-Things-Services”).
Paul Vickers is a UK Chartered Engineer with a BSc degree in Computer Studies and a PhD in Software Engineering & HCI. He is currently Reader in Computer Science at Northumbria University. His research is in the computing domain where it intersects with creative digital media with a particular emphasis on auditory display and how audio may be used in visualization for security applications.

Indices