Bültmann & Gerriets
Critical Infrastructure Protection III
Third IFIP WG 11.10 International Conference, Hanover, New Hampshire, USA, March 23-25, 2009, Revised Selected Papers
von Charles Palmer, Sujeet Shenoi
Verlag: Springer Berlin Heidelberg
Reihe: IFIP Advances in Information and Communication Technology Nr. 311
Reihe: IFIP International Federation for Information Processing Nr. 311
E-Book / PDF
Kopierschutz: PDF mit Wasserzeichen

Hinweis: Nach dem Checkout (Kasse) wird direkt ein Link zum Download bereitgestellt. Der Link kann dann auf PC, Smartphone oder E-Book-Reader ausgeführt werden.
E-Books können per PayPal bezahlt werden. Wenn Sie E-Books per Rechnung bezahlen möchten, kontaktieren Sie uns bitte.

ISBN: 978-3-642-04798-5
Auflage: 2009
Erschienen am 01.10.2009
Sprache: Englisch
Umfang: 257 Seiten

Preis: 96,29 €

Inhaltsverzeichnis
Klappentext

Risk Management.- Information Risk Management and Resilience.- Does the Liberalization of the European Railway Sector Increase Systemic Risk?.- Risk-Based Criticality Analysis.- Modeling and Managing Risk in Billing Infrastructures.- Control Systems Security.- A Taxonomy of Attacks on the DNP3 Protocol.- Design and Implementation of a Secure Modbus Protocol.- Providing Situational Awareness for Pipeline Control Operations.- Enhancing the Safety, Security and Resilience of ICT and Scada Systems Using Action Research.- An Ontology for Identifying Cyber Intrusion Induced Faults in Process Control Systems.- Using Physical Models for Anomaly Detection in Control Systems.- Detecting Anomalies in Process Control Networks.- Infrastructure Security.- Nondeducibility-Based Analysis of Cyber-Physical Systems.- Stack-Based Buffer Overflows in Harvard Class Embedded Systems.- Secure Cross-Domain Train Scheduling.- Infrastructure Modeling and Simulation.- A Holistic-Reductionistic Approach for Modeling Interdependencies.- Ontology-Based Critical Infrastructure Modeling and Simulation.- A Framework for Modeling Interdependencies in Japan's Critical Infrastructures.



The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: inf- mation technology, telecommunications, energy, banking and ?nance, tra- portation systems, chemicals, agriculture and food, defense industrial base, public health and health care, national monuments and icons, drinking water and water treatment systems, commercial facilities, dams, emergency services, commercial nuclear reactors, materials and waste, postal and shipping, and government facilities. Global business and industry, governments, indeed - ciety itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed. This book, Critical Infrastructure Protection III, is the third volume in the annualseriesproducedbyIFIP WorkingGroup11.10onCriticalInfrastructure Protection, an active international community of scientists, engineers, prac- tioners and policy makers dedicated to advancing research, development and implementation e?orts related to critical infrastructure protection. The book presents original research results and innovative applications in the area of infrastructure protection. Also, it highlights the importance of weaving s- ence, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. This volume contains seventeen edited papers from the Third Annual IFIP Working Group 11.10 International Conference on Critical Infrastructure P- tection, held at Dartmouth College, Hanover, New Hampshire, March 23-25, 2009. The papers were refereed by members of IFIP Working Group 11.10 and other internationally-recognized experts in critical infrastructure protection.


andere Formate
weitere Titel der Reihe