Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection

Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection

Christopher Laing (Northumbria University, UK), Atta Badii (University of Reading, UK) and Paul Vickers (Northumbria University, UK)
Indexed In: SCOPUS View 2 More Indices
Release Date: December, 2012|Copyright: © 2013 |Pages: 450
DOI: 10.4018/978-1-4666-2659-1
ISBN13: 9781466626591|ISBN10: 1466626593|EISBN13: 9781466626904
Hardcover:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
(Multi-User License)
Available
$175.50
List Price: $195.00
10% Discount:-$19.50
TOTAL SAVINGS: $19.50
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
E-Book:
(Multi-User License)
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical.

Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyzes the technical, procedural, and managerial responses to securing these systems.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Critical Infrastructures
  • Industrial Control Systems
  • Risk Analysis and Assessment
  • SCADA systems
  • Security
  • Security Testing
  • Supervisory Control And Data Acquisition (SCADA)
  • Threat Protection
Reviews and Testimonials

While there are numerous benefits to be gained from the gradual convergence of cloud services, smart grid (the evolving intelligent electric grid), and mobile telecommunications, the changes they bring to the technology environment also open up that environment to new security vulnerabilities. In response, the contributors explore critical infrastructure, mitigation of and protection against attacks, and failure-recovery emergency response policy creation at both national and international levels. Topics addressed include: security threats and risks of intelligent building systems, detecting cyber attacks on SCADA (supervisory control and data acquisition) and other critical infrastructures, industrial control systems, assessing critical infrastructure in terms of cyber threats and protections, designing a security audit plan, fortifying large-scale networks, and more. Editors are Laing and Vickers (Northumbria U., UK), Badii (U. of Reading, UK).

– Annotation ©2013 Book News Inc. Portland, OR
Table of Contents
Search this Book:
Reset
Editor Biographies
Christopher Laing is the Project Director of the nuWARP, Northumbria University, a not-forprofit organization, part of the UK government’s Centre for the Protection of National Infrastructure initiative on securing data and network information infrastructures. He is also a consultant for the European Network & Information Security Agency, and he has worked with UK law enforcement agencies in the development of postgraduate computer forensics/digital security programmes. His research is focused on network infrastructures, in particular how the behaviour of complex network infrastructures may be used as a self-adapting defence mechanism.
Atta Badii is a high ranking Professor at the University of Reading, UK (Chair of Secure Pervasive Technologies). He has a track record of over 20 years of trans-disciplinary academic and industrial research contributions in systems engineering; rooted in the disciplines that contribute to socially responsible and inclusive innovation of security-privacy-aware ICT to serve pervasive-assistive technologies. This work has resulted in solution innovation involving a convergence of mobile telecommunication with emergent internet, cloud services, and, intelligent media technologies in smart environments. Such smart environments are to enable fluid availability and inter-operability of assistive services and digital media content to meet the needs of various life-styles and work-styles everywhere (as people interact securely with their personal real-digital-virtual worlds within the globalised “Internet-of-People-Things-Services”).
Paul Vickers is a UK Chartered Engineer with a BSc degree in Computer Studies and a PhD in Software Engineering & HCI. He is currently Reader in Computer Science at Northumbria University. His research is in the computing domain where it intersects with creative digital media with a particular emphasis on auditory display and how audio may be used in visualization for security applications.
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). Learn More >
Ethics & Malpractice
IGI Global book and journal editors and authors are provided written guidelines and checklists that must be followed to maintain the high value that IGI Global places on the work it publishes. As a full member of the Committee on Publication Ethics (COPE), all editors, authors and reviewers must adhere to specific ethical and quality standards, which includes IGI Global’s full ethics and malpractice guidelines and editorial policies. These apply to all books, journals, chapters, and articles submitted and accepted for publication. To review our full policies, conflict of interest statement, and post-publication corrections, view IGI Global’s Full Ethics and Malpractice Statement.