Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection
Book Citation Index

Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection

Indexed In: SCOPUS View 3 More Indices
Release Date: December, 2012|Copyright: © 2013 |Pages: 450
DOI: 10.4018/978-1-4666-2659-1
ISBN13: 9781466626591|ISBN10: 1466626593|EISBN13: 9781466626904
Hardcover:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Article Processing Charge:
Available
$700.00
TOTAL SAVINGS: $700.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Effective immediately, IGI Global has discontinued softcover book production. The softcover option is no longer available for direct purchase.
Description & Coverage
Description:

The increased use of technology is necessary in order for industrial control systems to maintain and monitor industrial, infrastructural, or environmental processes. The need to secure and identify threats to the system is equally critical.

Securing Critical Infrastructures and Critical Control Systems: Approaches for Threat Protection provides a full and detailed understanding of the vulnerabilities and security threats that exist within an industrial control system. This collection of research defines and analyzes the technical, procedural, and managerial responses to securing these systems.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Critical Infrastructures
  • Industrial Control Systems
  • Risk Analysis and Assessment
  • SCADA systems
  • Security
  • Security Testing
  • Supervisory Control And Data Acquisition (SCADA)
  • Threat Protection
Reviews & Statements

While there are numerous benefits to be gained from the gradual convergence of cloud services, smart grid (the evolving intelligent electric grid), and mobile telecommunications, the changes they bring to the technology environment also open up that environment to new security vulnerabilities. In response, the contributors explore critical infrastructure, mitigation of and protection against attacks, and failure-recovery emergency response policy creation at both national and international levels. Topics addressed include: security threats and risks of intelligent building systems, detecting cyber attacks on SCADA (supervisory control and data acquisition) and other critical infrastructures, industrial control systems, assessing critical infrastructure in terms of cyber threats and protections, designing a security audit plan, fortifying large-scale networks, and more. Editors are Laing and Vickers (Northumbria U., UK), Badii (U. of Reading, UK).

– Annotation ©2013 Book News Inc. Portland, OR
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Christopher Laing is the Project Director of the nuWARP, Northumbria University, a not-forprofit organization, part of the UK government’s Centre for the Protection of National Infrastructure initiative on securing data and network information infrastructures. He is also a consultant for the European Network & Information Security Agency, and he has worked with UK law enforcement agencies in the development of postgraduate computer forensics/digital security programmes. His research is focused on network infrastructures, in particular how the behaviour of complex network infrastructures may be used as a self-adapting defence mechanism.
Atta Badii is a high ranking Professor at the University of Reading, UK (Chair of Secure Pervasive Technologies). He has a track record of over 20 years of trans-disciplinary academic and industrial research contributions in systems engineering; rooted in the disciplines that contribute to socially responsible and inclusive innovation of security-privacy-aware ICT to serve pervasive-assistive technologies. This work has resulted in solution innovation involving a convergence of mobile telecommunication with emergent internet, cloud services, and, intelligent media technologies in smart environments. Such smart environments are to enable fluid availability and inter-operability of assistive services and digital media content to meet the needs of various life-styles and work-styles everywhere (as people interact securely with their personal real-digital-virtual worlds within the globalised “Internet-of-People-Things-Services”).
Paul Vickers is a UK Chartered Engineer with a BSc degree in Computer Studies and a PhD in Software Engineering & HCI. He is currently Reader in Computer Science at Northumbria University. His research is in the computing domain where it intersects with creative digital media with a particular emphasis on auditory display and how audio may be used in visualization for security applications.
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.