This book, written by leaders in the protection field of critical infrastructures, provides an extended overview of the technological and operative advantages together with the security problems and challenges of the new paradigm of the Internet of Things in today's industry, also known as the Industry Internet of Things (IIoT). The incorporation of the new embedded technologies and the interconnected networking advances in the automation and monitoring processes, certainly multiplies the functional complexities of the underlying control system, whilst increasing security and privacy risks.…mehr
This book, written by leaders in the protection field of critical infrastructures, provides an extended overview of the technological and operative advantages together with the security problems and challenges of the new paradigm of the Internet of Things in today's industry, also known as the Industry Internet of Things (IIoT).
The incorporation of the new embedded technologies and the interconnected networking advances in the automation and monitoring processes, certainly multiplies the functional complexities of the underlying control system, whilst increasing security and privacy risks. The critical nature of the application context and its relevance for the well-being of citizens and their economy, attracts the attention of multiple, advanced attackers, with stealthy abilities to evade security policies, ex-filter information or exploit vulnerabilities. Some real-life events and registers in CERTs have already clearly demonstrated how the control industry can becomevulnerable to multiple types of advanced threats whose focus consists in hitting the safety and security of the control processes.
This book, therefore, comprises a detailed spectrum of research papers with highly analytical content and actuation procedures to cover the relevant security and privacy issues such as data protection, awareness, response and resilience, all of them working at optimal times. Readers will be able to comprehend the construction problems of the fourth industrial revolution and are introduced to effective, lightweight protection solutions which can be integrated as part of the new IIoT-based monitoring ecosystem.
Produktdetails
Produktdetails
Advanced Sciences and Technologies for Security Applications
Cristina Alcaraz is an assistant professor at the University of Malaga. She received the most competitive and recognized postdoctoral fellowship ("Ramón y Cajal") in Spain and she was a guest researcher at NIST, US (2011-2012), and a visiting postdoc at the Royal Holloway (2012-2014) under a Marie-Curie doctoral fellowship. She is currently involved in European and national research projects, specializing in topics related to CIP, more specifically, those associated with the security of SCADA systems, Industrial Internet of Things, Industry 4.0, cyber-physical systems, and Smart Grids, with extensive expertise in (wide) situational awareness and resilience. She has published more than 60 papers, serves on the editorial boards of six international journals in the field (e.g. IJCIP, IJIS), and has participated in multiple international conference program committees.
Inhaltsangabe
Part 1. Security Analysis and Advanced Threats.- Securing industrial Control Systems.- Towards a Secure Industrial Internet of Things.- Advanced Persistent Threats and Zero-Day Exploits in Industrial Internet of Things.- Part 2. Secure Interconnection Mechanisms.- A Survey on Lightweight Authenticated Encryption and Challenges for Securing Industrial IoT.- Access Control in the Industrial Internet of Things.- A Distributed Usage Control Framework for Industrial Internet of Things.- Part 3. Advanced Protection Techniques.- Profiling Communications in Industrial IP Networks: Model Complexity and Anomaly Detectionl.- Improving Security in Industrial Internet of Things: a Distributed Intrusion Detection Methodology.- Who's there? Evaluating data source integrity and veracity in IIoT using Multivariate Statistical Process Control.- Secure Machine to Machine Communication in Industrial Internet of Things.- Part 4. Privacy Issues in Industrial Connected Networks.- Modelling the Privacy Impact of External Knowledge for Sensor Data in the Industrial Internet of Things.- Security and Privacy Techniques for the Industrial Internet of Thing.- Part 5. Application Scenarios.- IIoT in the Hospital scenario: Hospital 4.0, Blockchain and Robust Data Management.- Design and Realization of Testbeds for Security Research in the Industrial Internet of Things.
Part 1. Security Analysis and Advanced Threats.- Securing industrial Control Systems.- Towards a Secure Industrial Internet of Things.- Advanced Persistent Threats and Zero-Day Exploits in Industrial Internet of Things.- Part 2. Secure Interconnection Mechanisms.- A Survey on Lightweight Authenticated Encryption and Challenges for Securing Industrial IoT.- Access Control in the Industrial Internet of Things.- A Distributed Usage Control Framework for Industrial Internet of Things.- Part 3. Advanced Protection Techniques.- Profiling Communications in Industrial IP Networks: Model Complexity and Anomaly Detectionl.- Improving Security in Industrial Internet of Things: a Distributed Intrusion Detection Methodology.- Who’s there? Evaluating data source integrity and veracity in IIoT using Multivariate Statistical Process Control.- Secure Machine to Machine Communication in Industrial Internet of Things.- Part 4. Privacy Issues in Industrial Connected Networks.- Modelling the Privacy Impact of External Knowledge for Sensor Data in the Industrial Internet of Things.- Security and Privacy Techniques for the Industrial Internet of Thing.- Part 5. Application Scenarios.- IIoT in the Hospital scenario: Hospital 4.0, Blockchain and Robust Data Management.- Design and Realization of Testbeds for Security Research in the Industrial Internet of Things.
Part 1. Security Analysis and Advanced Threats.- Securing industrial Control Systems.- Towards a Secure Industrial Internet of Things.- Advanced Persistent Threats and Zero-Day Exploits in Industrial Internet of Things.- Part 2. Secure Interconnection Mechanisms.- A Survey on Lightweight Authenticated Encryption and Challenges for Securing Industrial IoT.- Access Control in the Industrial Internet of Things.- A Distributed Usage Control Framework for Industrial Internet of Things.- Part 3. Advanced Protection Techniques.- Profiling Communications in Industrial IP Networks: Model Complexity and Anomaly Detectionl.- Improving Security in Industrial Internet of Things: a Distributed Intrusion Detection Methodology.- Who's there? Evaluating data source integrity and veracity in IIoT using Multivariate Statistical Process Control.- Secure Machine to Machine Communication in Industrial Internet of Things.- Part 4. Privacy Issues in Industrial Connected Networks.- Modelling the Privacy Impact of External Knowledge for Sensor Data in the Industrial Internet of Things.- Security and Privacy Techniques for the Industrial Internet of Thing.- Part 5. Application Scenarios.- IIoT in the Hospital scenario: Hospital 4.0, Blockchain and Robust Data Management.- Design and Realization of Testbeds for Security Research in the Industrial Internet of Things.
Part 1. Security Analysis and Advanced Threats.- Securing industrial Control Systems.- Towards a Secure Industrial Internet of Things.- Advanced Persistent Threats and Zero-Day Exploits in Industrial Internet of Things.- Part 2. Secure Interconnection Mechanisms.- A Survey on Lightweight Authenticated Encryption and Challenges for Securing Industrial IoT.- Access Control in the Industrial Internet of Things.- A Distributed Usage Control Framework for Industrial Internet of Things.- Part 3. Advanced Protection Techniques.- Profiling Communications in Industrial IP Networks: Model Complexity and Anomaly Detectionl.- Improving Security in Industrial Internet of Things: a Distributed Intrusion Detection Methodology.- Who’s there? Evaluating data source integrity and veracity in IIoT using Multivariate Statistical Process Control.- Secure Machine to Machine Communication in Industrial Internet of Things.- Part 4. Privacy Issues in Industrial Connected Networks.- Modelling the Privacy Impact of External Knowledge for Sensor Data in the Industrial Internet of Things.- Security and Privacy Techniques for the Industrial Internet of Thing.- Part 5. Application Scenarios.- IIoT in the Hospital scenario: Hospital 4.0, Blockchain and Robust Data Management.- Design and Realization of Testbeds for Security Research in the Industrial Internet of Things.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497