Handbook on Securing Cyber-Physical Critical Infrastructure

Front Cover
Elsevier, Jan 25, 2012 - Computers - 848 pages
0 Reviews

The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques – while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system.

  • Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios
  • Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on
  • Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

I Theoretical Foundations
1
II Security for Wireless Mobile Networks
95
III Security for Sensor Networks
223
IV Platform Security
301
V Cloud Computing and Data Security
357
VI Event Monitoring and Situation Awareness
451
VII Policy Issues in Security Management
549
VIII Security in RealWorld Systems
633
Index
791
Copyright

Other editions - View all

Common terms and phrases

About the author (2012)

Sajal K. Das is a University Distinguished Scholar Professor of Computer Science and Engineering and the Founding Director of the Center for Research in Wireless Mobility and Networking (CReWMaN) at the University of Texas at Arlington (UTA).

Krishna Kant is currently with George Mason University and on leave of absence from Intel

Corporation where he has worked since 1997. His current areas of research include robustness in the Internet, cloud computing security, and sustainable computing.

Nan Zhang is an Assistant Professor of Computer Science at the George Washington University, Washington, DC, USA. Prior to joining GWU, he was an assistant professor of Computer Science and Engineering at the University of Texas at Arlington from 2006 to 2008.

His current research interests span security and privacy issues in databases, data mining, and computer networks.

Bibliographic information