Critical infrastructure protection
Author(s)
Bibliographic Information
Critical infrastructure protection
(The International Federation for Information Processing, 253)
Springer, c2008
- Other Title
-
IFIP WG 11.10 Series in Critical Infrastructure Protection
International Conference on Critical Infrastructure Protection
Available at 1 libraries
  Aomori
  Iwate
  Miyagi
  Akita
  Yamagata
  Fukushima
  Ibaraki
  Tochigi
  Gunma
  Saitama
  Chiba
  Tokyo
  Kanagawa
  Niigata
  Toyama
  Ishikawa
  Fukui
  Yamanashi
  Nagano
  Gifu
  Shizuoka
  Aichi
  Mie
  Shiga
  Kyoto
  Osaka
  Hyogo
  Nara
  Wakayama
  Tottori
  Shimane
  Okayama
  Hiroshima
  Yamaguchi
  Tokushima
  Kagawa
  Ehime
  Kochi
  Fukuoka
  Saga
  Nagasaki
  Kumamoto
  Oita
  Miyazaki
  Kagoshima
  Okinawa
  Korea
  China
  Thailand
  United Kingdom
  Germany
  Switzerland
  France
  Belgium
  Netherlands
  Sweden
  Norway
  United States of America
Note
Includes bibliographical references
"... the first annual IFIP Working Group 11.10 International Conference on Critical Infrastructure Protection, held at Dartmouth College, Hanover, New Hampshire, March 19-21, 2007" -- on pref
Description and Table of Contents
Description
The information infrastructure--comprising computers, embedded devices, networks and software systems--is vital to operations in every sector. Global business and industry, governments, and society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed.
This book contains a selection of 27 edited papers from the First Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection.
Table of Contents
Themes And Issues.- On the Security Implications of Disruptive Technologies.- Cyber Security: Are Economic Incentives Adequate?.- Government Intervention in Information Infrastructure Protection.- Infrastructure Security.- Security of Information Flow in the Electric Power Grid.- Securing Positive Train Control Systems.- Lessons Learned from the Maroochy Water Breach.- Reducing Risk in Oil and Gas Production Operations.- Control Systems Security.- Securing Current and Future Process Control Systems.- Security Strategies for SCADA Networks.- Security Enhancements for Distributed Control Systems.- Security Challenges of Reconfigurable Devices in the Power Grid.- Intrusion Detection and Event Monitoring in SCADA Networks.- Passive Scanning in Modbus Networks.- Formal Modeling and Analysis of the Modbus Protocol.- Security Analysis of Multilayer SCADA Protocols.- Remote Forensic Analysis of Process Control Systems.- Creating a European SCADA Security Testbed.- Network Infrastructure Security.- Protecting Internet Services from Low-Rate DoS Attacks.- Detecting Wormhole Attacks in Wireless Sensor Networks.- Detecting Non-Discoverable Bluetooth Devices.- Infrastructure Interdependencies.- Risk Analysis in Interdependent Infrastructures.- Analysis of Interdependencies Between Italy's Economic Sectors.- The ISE Metamodel for Critical Infrastructures.- Multigraph Dependency Models for Heterogeneous Infrastructures.- Visualizing Cascading Failures in Critical Cyber Infrastructures.- Risk Assessment.- A Service-Oriented Approach for Assessing Infrastructure Security.- Analysis of Electrical Power and Oil and Gas Pipeline Failures.
by "Nielsen BookData"