The Security of Critical Infrastructures: Risk, Resilience and Defense
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing AG
2020
|
Schriftenreihe: | International Series in Operations Research and Management Science Ser.
v.288 |
Schlagworte: | |
Online-Zugang: | HWR01 |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 Online-Ressource (212 pages) |
ISBN: | 9783030418267 |
Internformat
MARC
LEADER | 00000nmm a2200000zcb4500 | ||
---|---|---|---|
001 | BV048222703 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 220516s2020 |||| o||u| ||||||eng d | ||
020 | |a 9783030418267 |9 978-3-030-41826-7 | ||
035 | |a (ZDB-30-PQE)EBC6191426 | ||
035 | |a (ZDB-30-PAD)EBC6191426 | ||
035 | |a (ZDB-89-EBL)EBL6191426 | ||
035 | |a (OCoLC)1153811682 | ||
035 | |a (DE-599)BVBBV048222703 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-2070s | ||
082 | 0 | |a 5.8 | |
084 | |a QR 600 |0 (DE-625)142072: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a ZG 9287 |0 (DE-625)156058: |2 rvk | ||
084 | |a ZG 9290 |0 (DE-625)156059: |2 rvk | ||
100 | 1 | |a Keupp, Marcus Matthias |e Verfasser |4 aut | |
245 | 1 | 0 | |a The Security of Critical Infrastructures |b Risk, Resilience and Defense |
264 | 1 | |a Cham |b Springer International Publishing AG |c 2020 | |
264 | 4 | |c ©2020 | |
300 | |a 1 Online-Ressource (212 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a International Series in Operations Research and Management Science Ser. |v v.288 | |
500 | |a Description based on publisher supplied metadata and other sources | ||
505 | 8 | |a Intro -- Preface -- Contents -- About the Authors -- The Security of Critical Infrastructures: Introduction and Overview -- 1 The Vulnerability of Critical Infrastructures -- 2 Contributions and Structure -- 3 Building Better Infrastructure -- References -- Part I Risk -- Networks of Critical Infrastructures: Cost Estimation and Defense of Attacks -- 1 Introduction -- 2 Background -- 3 Methods -- 3.1 Operator Model -- 3.2 Inclusion of Shortage and Formulation in Standard Form -- 3.3 Modeling an Attack Scenario -- 3.4 The Attacker-Defender Model -- 3.5 Application to a Small Example -- 3.6 Application to the Anytown Network -- 4 Conclusion and Outlook -- References -- Insurability of Critical Infrastructures -- 1 Introduction -- 2 Pareto Estimation of Risk Premiums -- 3 Simulation of Bankruptcy Risk -- 4 Conclusion -- References -- Part II Resilience -- Deliberate Attacks on Freshwater Supply Systems: A Compartmentalized Model for Damage Assessment -- 1 Introduction -- 2 Model Compartments and Parameters -- 3 Model Dynamics and Damage Calculation -- 4 Illustration -- 5 Discussion and Outlook -- 6 Technical Appendix -- 6.1 Derivation of System Dynamics -- 6.2 Effective Impact of an Attack -- References -- Mass Casualty Treatment After Attacks on Critical Infrastructure: An Economic Perspective -- 1 Introduction -- 2 The Consequences of Mass Casualty Incidents -- 2.1 Monetary Loss to the Economy -- 2.2 Strained Medical Emergency Services Capacity -- 3 Illustration for Three Model Economies -- 3.1 Parametrization -- 3.2 Simulation Results -- 3.3 Minimization of Monetary Loss -- 4 Discussion -- References -- Vulnerability and Resilience of National Power Grids: A Graph-Theoretical Optimization Approach and Empirical Simulation -- 1 Introduction -- 2 Analyzing Power Grids Using Graph Theory -- 2.1 Power Flow Calculation Using Linear Programming | |
505 | 8 | |a 2.2 (N-1) Analysis and Resulting Uncovered Demand -- 3 Vulnerability Analysis of Power Grids -- 3.1 Node Removal -- 3.2 Edge Removal -- 4 Simulation -- 4.1 Capacity Model -- 4.2 Calculation -- 4.3 Results -- 4.3.1 Node Removal -- 4.3.2 Edge Removal -- 5 Discussion -- References -- A Robust Supply Chain Model for a National Economy with Many Goods, Multiple Import Routes, and Compulsory Stockpiling -- 1 Introduction -- 2 Model Specification -- 3 Application -- 3.1 Simple Illustration -- 3.2 Complex Disruption Case -- 3.3 Contingency Analysis for Different Stockpile Configurations -- 4 Outlook -- References -- Assessing the Reliability of Street Networks: A Case Study Based on the Swiss Street Network -- 1 Introduction -- 2 Planning Problem -- 3 Construction of Graph -- 4 Estimation of Traffic Matrices -- 5 Formulation of Traffic Flow Model -- 5.1 Notation -- 5.2 Constraints -- 5.3 Objective Function -- 6 Computational Results -- 6.1 Illustrative Example -- 6.2 Application to the Street Network of the City of Bern -- 6.3 Application to the Swiss Street Network -- 6.4 Application to Train Networks -- 7 Conclusion -- References -- Securing the Air-Ground Link in Aviation -- 1 Introduction -- 2 Classification of Air-Ground Link Incidents and Vulnerabilities -- 2.1 Security Incidents -- 2.1.1 ADS-B -- 2.1.2 SSR -- 2.1.3 PSR -- 2.1.4 MLAT -- 2.1.5 VHF -- 2.1.6 ACARS -- 2.1.7 CPDLC -- 2.2 Privacy Incidents -- 2.2.1 Tracking-Related Privacy Leaks -- 2.2.2 Leaks of Personal Data -- 3 Defense -- 3.1 Security Countermeasures -- 3.1.1 Cyber-Physical Security -- 3.1.2 Machine Learning -- 3.1.3 Non-technical Measures -- 3.1.4 Cryptography -- 3.2 Privacy Countermeasures -- 3.2.1 Countermeasures Against Tracking -- 3.2.2 Privacy for Data Links -- 4 Research Agenda -- 4.1 Security -- 4.2 Privacy -- References -- Part III Defense | |
505 | 8 | |a On Dependable Cyber-Physical Spaces of Critical Infrastructures -- 1 Introduction -- 2 Case Study -- 2.1 Cyber-Physical Space of a Critical Facility -- 2.2 Security Scenarios -- 3 Modeling and Early Design Validation -- 3.1 Modeling Space with Bigraphs -- 3.2 Enabling Automated Analysis -- 3.3 Design-Time Probabilistic Analysis -- 4 Spatial Verification of Cyber-Physical Spaces at Runtime -- 4.1 Bigraphical Closure Models at Runtime -- 4.2 Run-Time Verification of Spatial Properties -- 5 Related Work and Further Reading -- 5.1 Application-Oriented Perspective -- 5.2 Theoretical Perspective -- 6 Summary and Concluding Remarks -- References -- Forensic Analysis as Iterative Learning -- 1 Introduction -- 2 Forensic Defense as an Iterative Learning Cycle -- 2.1 Forensic Preparedness -- 2.2 Instrumenting Networks to Increase Visibility Over Cyberattacks -- 2.3 Cyberattack Detection -- 2.4 Scope Assessment and Eradication -- 2.5 Capability Development -- 3 Illustrative Example -- 4 Conclusion -- References -- Defending Critical Infrastructure: Insights from Recommender Systems -- 1 Introduction -- 2 Defense Strategy -- 3 Illustration -- 4 Evaluation -- 5 Conclusion -- References | |
650 | 4 | |a Computer networks-Security measures | |
650 | 0 | 7 | |a Kritische Infrastruktur |0 (DE-588)7636249-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitskritisches System |0 (DE-588)4767762-4 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4143413-4 |a Aufsatzsammlung |2 gnd-content | |
689 | 0 | 0 | |a Kritische Infrastruktur |0 (DE-588)7636249-8 |D s |
689 | 0 | 1 | |a Sicherheitskritisches System |0 (DE-588)4767762-4 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Keupp, Marcus Matthias |t The Security of Critical Infrastructures |d Cham : Springer International Publishing AG,c2020 |z 9783030418250 |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-033603436 | ||
966 | e | |u https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=6191426 |l HWR01 |p ZDB-30-PQE |q HWR_PDA_PQE |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804184004245585920 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Keupp, Marcus Matthias |
author_facet | Keupp, Marcus Matthias |
author_role | aut |
author_sort | Keupp, Marcus Matthias |
author_variant | m m k mm mmk |
building | Verbundindex |
bvnumber | BV048222703 |
classification_rvk | QR 600 ST 277 ZG 9287 ZG 9290 |
collection | ZDB-30-PQE |
contents | Intro -- Preface -- Contents -- About the Authors -- The Security of Critical Infrastructures: Introduction and Overview -- 1 The Vulnerability of Critical Infrastructures -- 2 Contributions and Structure -- 3 Building Better Infrastructure -- References -- Part I Risk -- Networks of Critical Infrastructures: Cost Estimation and Defense of Attacks -- 1 Introduction -- 2 Background -- 3 Methods -- 3.1 Operator Model -- 3.2 Inclusion of Shortage and Formulation in Standard Form -- 3.3 Modeling an Attack Scenario -- 3.4 The Attacker-Defender Model -- 3.5 Application to a Small Example -- 3.6 Application to the Anytown Network -- 4 Conclusion and Outlook -- References -- Insurability of Critical Infrastructures -- 1 Introduction -- 2 Pareto Estimation of Risk Premiums -- 3 Simulation of Bankruptcy Risk -- 4 Conclusion -- References -- Part II Resilience -- Deliberate Attacks on Freshwater Supply Systems: A Compartmentalized Model for Damage Assessment -- 1 Introduction -- 2 Model Compartments and Parameters -- 3 Model Dynamics and Damage Calculation -- 4 Illustration -- 5 Discussion and Outlook -- 6 Technical Appendix -- 6.1 Derivation of System Dynamics -- 6.2 Effective Impact of an Attack -- References -- Mass Casualty Treatment After Attacks on Critical Infrastructure: An Economic Perspective -- 1 Introduction -- 2 The Consequences of Mass Casualty Incidents -- 2.1 Monetary Loss to the Economy -- 2.2 Strained Medical Emergency Services Capacity -- 3 Illustration for Three Model Economies -- 3.1 Parametrization -- 3.2 Simulation Results -- 3.3 Minimization of Monetary Loss -- 4 Discussion -- References -- Vulnerability and Resilience of National Power Grids: A Graph-Theoretical Optimization Approach and Empirical Simulation -- 1 Introduction -- 2 Analyzing Power Grids Using Graph Theory -- 2.1 Power Flow Calculation Using Linear Programming 2.2 (N-1) Analysis and Resulting Uncovered Demand -- 3 Vulnerability Analysis of Power Grids -- 3.1 Node Removal -- 3.2 Edge Removal -- 4 Simulation -- 4.1 Capacity Model -- 4.2 Calculation -- 4.3 Results -- 4.3.1 Node Removal -- 4.3.2 Edge Removal -- 5 Discussion -- References -- A Robust Supply Chain Model for a National Economy with Many Goods, Multiple Import Routes, and Compulsory Stockpiling -- 1 Introduction -- 2 Model Specification -- 3 Application -- 3.1 Simple Illustration -- 3.2 Complex Disruption Case -- 3.3 Contingency Analysis for Different Stockpile Configurations -- 4 Outlook -- References -- Assessing the Reliability of Street Networks: A Case Study Based on the Swiss Street Network -- 1 Introduction -- 2 Planning Problem -- 3 Construction of Graph -- 4 Estimation of Traffic Matrices -- 5 Formulation of Traffic Flow Model -- 5.1 Notation -- 5.2 Constraints -- 5.3 Objective Function -- 6 Computational Results -- 6.1 Illustrative Example -- 6.2 Application to the Street Network of the City of Bern -- 6.3 Application to the Swiss Street Network -- 6.4 Application to Train Networks -- 7 Conclusion -- References -- Securing the Air-Ground Link in Aviation -- 1 Introduction -- 2 Classification of Air-Ground Link Incidents and Vulnerabilities -- 2.1 Security Incidents -- 2.1.1 ADS-B -- 2.1.2 SSR -- 2.1.3 PSR -- 2.1.4 MLAT -- 2.1.5 VHF -- 2.1.6 ACARS -- 2.1.7 CPDLC -- 2.2 Privacy Incidents -- 2.2.1 Tracking-Related Privacy Leaks -- 2.2.2 Leaks of Personal Data -- 3 Defense -- 3.1 Security Countermeasures -- 3.1.1 Cyber-Physical Security -- 3.1.2 Machine Learning -- 3.1.3 Non-technical Measures -- 3.1.4 Cryptography -- 3.2 Privacy Countermeasures -- 3.2.1 Countermeasures Against Tracking -- 3.2.2 Privacy for Data Links -- 4 Research Agenda -- 4.1 Security -- 4.2 Privacy -- References -- Part III Defense On Dependable Cyber-Physical Spaces of Critical Infrastructures -- 1 Introduction -- 2 Case Study -- 2.1 Cyber-Physical Space of a Critical Facility -- 2.2 Security Scenarios -- 3 Modeling and Early Design Validation -- 3.1 Modeling Space with Bigraphs -- 3.2 Enabling Automated Analysis -- 3.3 Design-Time Probabilistic Analysis -- 4 Spatial Verification of Cyber-Physical Spaces at Runtime -- 4.1 Bigraphical Closure Models at Runtime -- 4.2 Run-Time Verification of Spatial Properties -- 5 Related Work and Further Reading -- 5.1 Application-Oriented Perspective -- 5.2 Theoretical Perspective -- 6 Summary and Concluding Remarks -- References -- Forensic Analysis as Iterative Learning -- 1 Introduction -- 2 Forensic Defense as an Iterative Learning Cycle -- 2.1 Forensic Preparedness -- 2.2 Instrumenting Networks to Increase Visibility Over Cyberattacks -- 2.3 Cyberattack Detection -- 2.4 Scope Assessment and Eradication -- 2.5 Capability Development -- 3 Illustrative Example -- 4 Conclusion -- References -- Defending Critical Infrastructure: Insights from Recommender Systems -- 1 Introduction -- 2 Defense Strategy -- 3 Illustration -- 4 Evaluation -- 5 Conclusion -- References |
ctrlnum | (ZDB-30-PQE)EBC6191426 (ZDB-30-PAD)EBC6191426 (ZDB-89-EBL)EBL6191426 (OCoLC)1153811682 (DE-599)BVBBV048222703 |
dewey-full | 5.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 5.8 |
dewey-search | 5.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Technik Informatik Wirtschaftswissenschaften |
discipline_str_mv | Technik Informatik Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07024nmm a2200541zcb4500</leader><controlfield tag="001">BV048222703</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">220516s2020 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030418267</subfield><subfield code="9">978-3-030-41826-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC6191426</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC6191426</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL6191426</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1153811682</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048222703</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-2070s</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">5.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QR 600</subfield><subfield code="0">(DE-625)142072:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZG 9287</subfield><subfield code="0">(DE-625)156058:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZG 9290</subfield><subfield code="0">(DE-625)156059:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Keupp, Marcus Matthias</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The Security of Critical Infrastructures</subfield><subfield code="b">Risk, Resilience and Defense</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing AG</subfield><subfield code="c">2020</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (212 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">International Series in Operations Research and Management Science Ser.</subfield><subfield code="v">v.288</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Intro -- Preface -- Contents -- About the Authors -- The Security of Critical Infrastructures: Introduction and Overview -- 1 The Vulnerability of Critical Infrastructures -- 2 Contributions and Structure -- 3 Building Better Infrastructure -- References -- Part I Risk -- Networks of Critical Infrastructures: Cost Estimation and Defense of Attacks -- 1 Introduction -- 2 Background -- 3 Methods -- 3.1 Operator Model -- 3.2 Inclusion of Shortage and Formulation in Standard Form -- 3.3 Modeling an Attack Scenario -- 3.4 The Attacker-Defender Model -- 3.5 Application to a Small Example -- 3.6 Application to the Anytown Network -- 4 Conclusion and Outlook -- References -- Insurability of Critical Infrastructures -- 1 Introduction -- 2 Pareto Estimation of Risk Premiums -- 3 Simulation of Bankruptcy Risk -- 4 Conclusion -- References -- Part II Resilience -- Deliberate Attacks on Freshwater Supply Systems: A Compartmentalized Model for Damage Assessment -- 1 Introduction -- 2 Model Compartments and Parameters -- 3 Model Dynamics and Damage Calculation -- 4 Illustration -- 5 Discussion and Outlook -- 6 Technical Appendix -- 6.1 Derivation of System Dynamics -- 6.2 Effective Impact of an Attack -- References -- Mass Casualty Treatment After Attacks on Critical Infrastructure: An Economic Perspective -- 1 Introduction -- 2 The Consequences of Mass Casualty Incidents -- 2.1 Monetary Loss to the Economy -- 2.2 Strained Medical Emergency Services Capacity -- 3 Illustration for Three Model Economies -- 3.1 Parametrization -- 3.2 Simulation Results -- 3.3 Minimization of Monetary Loss -- 4 Discussion -- References -- Vulnerability and Resilience of National Power Grids: A Graph-Theoretical Optimization Approach and Empirical Simulation -- 1 Introduction -- 2 Analyzing Power Grids Using Graph Theory -- 2.1 Power Flow Calculation Using Linear Programming</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.2 (N-1) Analysis and Resulting Uncovered Demand -- 3 Vulnerability Analysis of Power Grids -- 3.1 Node Removal -- 3.2 Edge Removal -- 4 Simulation -- 4.1 Capacity Model -- 4.2 Calculation -- 4.3 Results -- 4.3.1 Node Removal -- 4.3.2 Edge Removal -- 5 Discussion -- References -- A Robust Supply Chain Model for a National Economy with Many Goods, Multiple Import Routes, and Compulsory Stockpiling -- 1 Introduction -- 2 Model Specification -- 3 Application -- 3.1 Simple Illustration -- 3.2 Complex Disruption Case -- 3.3 Contingency Analysis for Different Stockpile Configurations -- 4 Outlook -- References -- Assessing the Reliability of Street Networks: A Case Study Based on the Swiss Street Network -- 1 Introduction -- 2 Planning Problem -- 3 Construction of Graph -- 4 Estimation of Traffic Matrices -- 5 Formulation of Traffic Flow Model -- 5.1 Notation -- 5.2 Constraints -- 5.3 Objective Function -- 6 Computational Results -- 6.1 Illustrative Example -- 6.2 Application to the Street Network of the City of Bern -- 6.3 Application to the Swiss Street Network -- 6.4 Application to Train Networks -- 7 Conclusion -- References -- Securing the Air-Ground Link in Aviation -- 1 Introduction -- 2 Classification of Air-Ground Link Incidents and Vulnerabilities -- 2.1 Security Incidents -- 2.1.1 ADS-B -- 2.1.2 SSR -- 2.1.3 PSR -- 2.1.4 MLAT -- 2.1.5 VHF -- 2.1.6 ACARS -- 2.1.7 CPDLC -- 2.2 Privacy Incidents -- 2.2.1 Tracking-Related Privacy Leaks -- 2.2.2 Leaks of Personal Data -- 3 Defense -- 3.1 Security Countermeasures -- 3.1.1 Cyber-Physical Security -- 3.1.2 Machine Learning -- 3.1.3 Non-technical Measures -- 3.1.4 Cryptography -- 3.2 Privacy Countermeasures -- 3.2.1 Countermeasures Against Tracking -- 3.2.2 Privacy for Data Links -- 4 Research Agenda -- 4.1 Security -- 4.2 Privacy -- References -- Part III Defense</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">On Dependable Cyber-Physical Spaces of Critical Infrastructures -- 1 Introduction -- 2 Case Study -- 2.1 Cyber-Physical Space of a Critical Facility -- 2.2 Security Scenarios -- 3 Modeling and Early Design Validation -- 3.1 Modeling Space with Bigraphs -- 3.2 Enabling Automated Analysis -- 3.3 Design-Time Probabilistic Analysis -- 4 Spatial Verification of Cyber-Physical Spaces at Runtime -- 4.1 Bigraphical Closure Models at Runtime -- 4.2 Run-Time Verification of Spatial Properties -- 5 Related Work and Further Reading -- 5.1 Application-Oriented Perspective -- 5.2 Theoretical Perspective -- 6 Summary and Concluding Remarks -- References -- Forensic Analysis as Iterative Learning -- 1 Introduction -- 2 Forensic Defense as an Iterative Learning Cycle -- 2.1 Forensic Preparedness -- 2.2 Instrumenting Networks to Increase Visibility Over Cyberattacks -- 2.3 Cyberattack Detection -- 2.4 Scope Assessment and Eradication -- 2.5 Capability Development -- 3 Illustrative Example -- 4 Conclusion -- References -- Defending Critical Infrastructure: Insights from Recommender Systems -- 1 Introduction -- 2 Defense Strategy -- 3 Illustration -- 4 Evaluation -- 5 Conclusion -- References</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks-Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kritische Infrastruktur</subfield><subfield code="0">(DE-588)7636249-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitskritisches System</subfield><subfield code="0">(DE-588)4767762-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4143413-4</subfield><subfield code="a">Aufsatzsammlung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kritische Infrastruktur</subfield><subfield code="0">(DE-588)7636249-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Sicherheitskritisches System</subfield><subfield code="0">(DE-588)4767762-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Keupp, Marcus Matthias</subfield><subfield code="t">The Security of Critical Infrastructures</subfield><subfield code="d">Cham : Springer International Publishing AG,c2020</subfield><subfield code="z">9783030418250</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033603436</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=6191426</subfield><subfield code="l">HWR01</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">HWR_PDA_PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | (DE-588)4143413-4 Aufsatzsammlung gnd-content |
genre_facet | Aufsatzsammlung |
id | DE-604.BV048222703 |
illustrated | Not Illustrated |
index_date | 2024-07-03T19:50:37Z |
indexdate | 2024-07-10T09:32:26Z |
institution | BVB |
isbn | 9783030418267 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033603436 |
oclc_num | 1153811682 |
open_access_boolean | |
owner | DE-2070s |
owner_facet | DE-2070s |
physical | 1 Online-Ressource (212 pages) |
psigel | ZDB-30-PQE ZDB-30-PQE HWR_PDA_PQE |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Springer International Publishing AG |
record_format | marc |
series2 | International Series in Operations Research and Management Science Ser. |
spelling | Keupp, Marcus Matthias Verfasser aut The Security of Critical Infrastructures Risk, Resilience and Defense Cham Springer International Publishing AG 2020 ©2020 1 Online-Ressource (212 pages) txt rdacontent c rdamedia cr rdacarrier International Series in Operations Research and Management Science Ser. v.288 Description based on publisher supplied metadata and other sources Intro -- Preface -- Contents -- About the Authors -- The Security of Critical Infrastructures: Introduction and Overview -- 1 The Vulnerability of Critical Infrastructures -- 2 Contributions and Structure -- 3 Building Better Infrastructure -- References -- Part I Risk -- Networks of Critical Infrastructures: Cost Estimation and Defense of Attacks -- 1 Introduction -- 2 Background -- 3 Methods -- 3.1 Operator Model -- 3.2 Inclusion of Shortage and Formulation in Standard Form -- 3.3 Modeling an Attack Scenario -- 3.4 The Attacker-Defender Model -- 3.5 Application to a Small Example -- 3.6 Application to the Anytown Network -- 4 Conclusion and Outlook -- References -- Insurability of Critical Infrastructures -- 1 Introduction -- 2 Pareto Estimation of Risk Premiums -- 3 Simulation of Bankruptcy Risk -- 4 Conclusion -- References -- Part II Resilience -- Deliberate Attacks on Freshwater Supply Systems: A Compartmentalized Model for Damage Assessment -- 1 Introduction -- 2 Model Compartments and Parameters -- 3 Model Dynamics and Damage Calculation -- 4 Illustration -- 5 Discussion and Outlook -- 6 Technical Appendix -- 6.1 Derivation of System Dynamics -- 6.2 Effective Impact of an Attack -- References -- Mass Casualty Treatment After Attacks on Critical Infrastructure: An Economic Perspective -- 1 Introduction -- 2 The Consequences of Mass Casualty Incidents -- 2.1 Monetary Loss to the Economy -- 2.2 Strained Medical Emergency Services Capacity -- 3 Illustration for Three Model Economies -- 3.1 Parametrization -- 3.2 Simulation Results -- 3.3 Minimization of Monetary Loss -- 4 Discussion -- References -- Vulnerability and Resilience of National Power Grids: A Graph-Theoretical Optimization Approach and Empirical Simulation -- 1 Introduction -- 2 Analyzing Power Grids Using Graph Theory -- 2.1 Power Flow Calculation Using Linear Programming 2.2 (N-1) Analysis and Resulting Uncovered Demand -- 3 Vulnerability Analysis of Power Grids -- 3.1 Node Removal -- 3.2 Edge Removal -- 4 Simulation -- 4.1 Capacity Model -- 4.2 Calculation -- 4.3 Results -- 4.3.1 Node Removal -- 4.3.2 Edge Removal -- 5 Discussion -- References -- A Robust Supply Chain Model for a National Economy with Many Goods, Multiple Import Routes, and Compulsory Stockpiling -- 1 Introduction -- 2 Model Specification -- 3 Application -- 3.1 Simple Illustration -- 3.2 Complex Disruption Case -- 3.3 Contingency Analysis for Different Stockpile Configurations -- 4 Outlook -- References -- Assessing the Reliability of Street Networks: A Case Study Based on the Swiss Street Network -- 1 Introduction -- 2 Planning Problem -- 3 Construction of Graph -- 4 Estimation of Traffic Matrices -- 5 Formulation of Traffic Flow Model -- 5.1 Notation -- 5.2 Constraints -- 5.3 Objective Function -- 6 Computational Results -- 6.1 Illustrative Example -- 6.2 Application to the Street Network of the City of Bern -- 6.3 Application to the Swiss Street Network -- 6.4 Application to Train Networks -- 7 Conclusion -- References -- Securing the Air-Ground Link in Aviation -- 1 Introduction -- 2 Classification of Air-Ground Link Incidents and Vulnerabilities -- 2.1 Security Incidents -- 2.1.1 ADS-B -- 2.1.2 SSR -- 2.1.3 PSR -- 2.1.4 MLAT -- 2.1.5 VHF -- 2.1.6 ACARS -- 2.1.7 CPDLC -- 2.2 Privacy Incidents -- 2.2.1 Tracking-Related Privacy Leaks -- 2.2.2 Leaks of Personal Data -- 3 Defense -- 3.1 Security Countermeasures -- 3.1.1 Cyber-Physical Security -- 3.1.2 Machine Learning -- 3.1.3 Non-technical Measures -- 3.1.4 Cryptography -- 3.2 Privacy Countermeasures -- 3.2.1 Countermeasures Against Tracking -- 3.2.2 Privacy for Data Links -- 4 Research Agenda -- 4.1 Security -- 4.2 Privacy -- References -- Part III Defense On Dependable Cyber-Physical Spaces of Critical Infrastructures -- 1 Introduction -- 2 Case Study -- 2.1 Cyber-Physical Space of a Critical Facility -- 2.2 Security Scenarios -- 3 Modeling and Early Design Validation -- 3.1 Modeling Space with Bigraphs -- 3.2 Enabling Automated Analysis -- 3.3 Design-Time Probabilistic Analysis -- 4 Spatial Verification of Cyber-Physical Spaces at Runtime -- 4.1 Bigraphical Closure Models at Runtime -- 4.2 Run-Time Verification of Spatial Properties -- 5 Related Work and Further Reading -- 5.1 Application-Oriented Perspective -- 5.2 Theoretical Perspective -- 6 Summary and Concluding Remarks -- References -- Forensic Analysis as Iterative Learning -- 1 Introduction -- 2 Forensic Defense as an Iterative Learning Cycle -- 2.1 Forensic Preparedness -- 2.2 Instrumenting Networks to Increase Visibility Over Cyberattacks -- 2.3 Cyberattack Detection -- 2.4 Scope Assessment and Eradication -- 2.5 Capability Development -- 3 Illustrative Example -- 4 Conclusion -- References -- Defending Critical Infrastructure: Insights from Recommender Systems -- 1 Introduction -- 2 Defense Strategy -- 3 Illustration -- 4 Evaluation -- 5 Conclusion -- References Computer networks-Security measures Kritische Infrastruktur (DE-588)7636249-8 gnd rswk-swf Sicherheitskritisches System (DE-588)4767762-4 gnd rswk-swf (DE-588)4143413-4 Aufsatzsammlung gnd-content Kritische Infrastruktur (DE-588)7636249-8 s Sicherheitskritisches System (DE-588)4767762-4 s DE-604 Erscheint auch als Druck-Ausgabe Keupp, Marcus Matthias The Security of Critical Infrastructures Cham : Springer International Publishing AG,c2020 9783030418250 |
spellingShingle | Keupp, Marcus Matthias The Security of Critical Infrastructures Risk, Resilience and Defense Intro -- Preface -- Contents -- About the Authors -- The Security of Critical Infrastructures: Introduction and Overview -- 1 The Vulnerability of Critical Infrastructures -- 2 Contributions and Structure -- 3 Building Better Infrastructure -- References -- Part I Risk -- Networks of Critical Infrastructures: Cost Estimation and Defense of Attacks -- 1 Introduction -- 2 Background -- 3 Methods -- 3.1 Operator Model -- 3.2 Inclusion of Shortage and Formulation in Standard Form -- 3.3 Modeling an Attack Scenario -- 3.4 The Attacker-Defender Model -- 3.5 Application to a Small Example -- 3.6 Application to the Anytown Network -- 4 Conclusion and Outlook -- References -- Insurability of Critical Infrastructures -- 1 Introduction -- 2 Pareto Estimation of Risk Premiums -- 3 Simulation of Bankruptcy Risk -- 4 Conclusion -- References -- Part II Resilience -- Deliberate Attacks on Freshwater Supply Systems: A Compartmentalized Model for Damage Assessment -- 1 Introduction -- 2 Model Compartments and Parameters -- 3 Model Dynamics and Damage Calculation -- 4 Illustration -- 5 Discussion and Outlook -- 6 Technical Appendix -- 6.1 Derivation of System Dynamics -- 6.2 Effective Impact of an Attack -- References -- Mass Casualty Treatment After Attacks on Critical Infrastructure: An Economic Perspective -- 1 Introduction -- 2 The Consequences of Mass Casualty Incidents -- 2.1 Monetary Loss to the Economy -- 2.2 Strained Medical Emergency Services Capacity -- 3 Illustration for Three Model Economies -- 3.1 Parametrization -- 3.2 Simulation Results -- 3.3 Minimization of Monetary Loss -- 4 Discussion -- References -- Vulnerability and Resilience of National Power Grids: A Graph-Theoretical Optimization Approach and Empirical Simulation -- 1 Introduction -- 2 Analyzing Power Grids Using Graph Theory -- 2.1 Power Flow Calculation Using Linear Programming 2.2 (N-1) Analysis and Resulting Uncovered Demand -- 3 Vulnerability Analysis of Power Grids -- 3.1 Node Removal -- 3.2 Edge Removal -- 4 Simulation -- 4.1 Capacity Model -- 4.2 Calculation -- 4.3 Results -- 4.3.1 Node Removal -- 4.3.2 Edge Removal -- 5 Discussion -- References -- A Robust Supply Chain Model for a National Economy with Many Goods, Multiple Import Routes, and Compulsory Stockpiling -- 1 Introduction -- 2 Model Specification -- 3 Application -- 3.1 Simple Illustration -- 3.2 Complex Disruption Case -- 3.3 Contingency Analysis for Different Stockpile Configurations -- 4 Outlook -- References -- Assessing the Reliability of Street Networks: A Case Study Based on the Swiss Street Network -- 1 Introduction -- 2 Planning Problem -- 3 Construction of Graph -- 4 Estimation of Traffic Matrices -- 5 Formulation of Traffic Flow Model -- 5.1 Notation -- 5.2 Constraints -- 5.3 Objective Function -- 6 Computational Results -- 6.1 Illustrative Example -- 6.2 Application to the Street Network of the City of Bern -- 6.3 Application to the Swiss Street Network -- 6.4 Application to Train Networks -- 7 Conclusion -- References -- Securing the Air-Ground Link in Aviation -- 1 Introduction -- 2 Classification of Air-Ground Link Incidents and Vulnerabilities -- 2.1 Security Incidents -- 2.1.1 ADS-B -- 2.1.2 SSR -- 2.1.3 PSR -- 2.1.4 MLAT -- 2.1.5 VHF -- 2.1.6 ACARS -- 2.1.7 CPDLC -- 2.2 Privacy Incidents -- 2.2.1 Tracking-Related Privacy Leaks -- 2.2.2 Leaks of Personal Data -- 3 Defense -- 3.1 Security Countermeasures -- 3.1.1 Cyber-Physical Security -- 3.1.2 Machine Learning -- 3.1.3 Non-technical Measures -- 3.1.4 Cryptography -- 3.2 Privacy Countermeasures -- 3.2.1 Countermeasures Against Tracking -- 3.2.2 Privacy for Data Links -- 4 Research Agenda -- 4.1 Security -- 4.2 Privacy -- References -- Part III Defense On Dependable Cyber-Physical Spaces of Critical Infrastructures -- 1 Introduction -- 2 Case Study -- 2.1 Cyber-Physical Space of a Critical Facility -- 2.2 Security Scenarios -- 3 Modeling and Early Design Validation -- 3.1 Modeling Space with Bigraphs -- 3.2 Enabling Automated Analysis -- 3.3 Design-Time Probabilistic Analysis -- 4 Spatial Verification of Cyber-Physical Spaces at Runtime -- 4.1 Bigraphical Closure Models at Runtime -- 4.2 Run-Time Verification of Spatial Properties -- 5 Related Work and Further Reading -- 5.1 Application-Oriented Perspective -- 5.2 Theoretical Perspective -- 6 Summary and Concluding Remarks -- References -- Forensic Analysis as Iterative Learning -- 1 Introduction -- 2 Forensic Defense as an Iterative Learning Cycle -- 2.1 Forensic Preparedness -- 2.2 Instrumenting Networks to Increase Visibility Over Cyberattacks -- 2.3 Cyberattack Detection -- 2.4 Scope Assessment and Eradication -- 2.5 Capability Development -- 3 Illustrative Example -- 4 Conclusion -- References -- Defending Critical Infrastructure: Insights from Recommender Systems -- 1 Introduction -- 2 Defense Strategy -- 3 Illustration -- 4 Evaluation -- 5 Conclusion -- References Computer networks-Security measures Kritische Infrastruktur (DE-588)7636249-8 gnd Sicherheitskritisches System (DE-588)4767762-4 gnd |
subject_GND | (DE-588)7636249-8 (DE-588)4767762-4 (DE-588)4143413-4 |
title | The Security of Critical Infrastructures Risk, Resilience and Defense |
title_auth | The Security of Critical Infrastructures Risk, Resilience and Defense |
title_exact_search | The Security of Critical Infrastructures Risk, Resilience and Defense |
title_exact_search_txtP | The Security of Critical Infrastructures Risk, Resilience and Defense |
title_full | The Security of Critical Infrastructures Risk, Resilience and Defense |
title_fullStr | The Security of Critical Infrastructures Risk, Resilience and Defense |
title_full_unstemmed | The Security of Critical Infrastructures Risk, Resilience and Defense |
title_short | The Security of Critical Infrastructures |
title_sort | the security of critical infrastructures risk resilience and defense |
title_sub | Risk, Resilience and Defense |
topic | Computer networks-Security measures Kritische Infrastruktur (DE-588)7636249-8 gnd Sicherheitskritisches System (DE-588)4767762-4 gnd |
topic_facet | Computer networks-Security measures Kritische Infrastruktur Sicherheitskritisches System Aufsatzsammlung |
work_keys_str_mv | AT keuppmarcusmatthias thesecurityofcriticalinfrastructuresriskresilienceanddefense |