• Complain

Stefan Rass - Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach (Advanced Sciences and Technologies for Security Applications)

Here you can read online Stefan Rass - Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach (Advanced Sciences and Technologies for Security Applications) full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2020, publisher: Springer, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Stefan Rass Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach (Advanced Sciences and Technologies for Security Applications)
  • Book:
    Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach (Advanced Sciences and Technologies for Security Applications)
  • Author:
  • Publisher:
    Springer
  • Genre:
  • Year:
    2020
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach (Advanced Sciences and Technologies for Security Applications): summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach (Advanced Sciences and Technologies for Security Applications)" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

This book presents a compendium of selected game- and decision-theoretic models to achieve and assess the security of critical infrastructures. Given contemporary reports on security incidents of various kinds, we can see a paradigm shift to attacks of an increasingly heterogeneous nature, combining different techniques into what we know as an advanced persistent threat. Security precautions must match these diverse threat patterns in an equally diverse manner; in response, this book provides a wealth of techniques for protection and mitigation.

Much traditional security research has a narrow focus on specific attack scenarios or applications, and strives to make an attack practically impossible. A more recent approach to security views it as a scenario in which the cost of an attack exceeds the potential reward. This does not rule out the possibility of an attack but minimizes its likelihood to the least possible risk. The book follows this economic definition of security, offering a management scientific view that seeks a balance between security investments and their resulting benefits. It focuses on optimization of resources in light of threats such as terrorism and advanced persistent threats.

Drawing on the authors experience and inspired by real case studies, the book provides a systematic approach to critical infrastructure security and resilience. Presenting a mixture of theoretical work and practical success stories, the book is chiefly intended for students and practitioners seeking an introduction to game- and decision-theoretic techniques for security. The required mathematical concepts are self-contained, rigorously introduced, and illustrated by case studies. The book also provides software tools that help guide readers in the practical use of the scientific models and computational frameworks.

Stefan Rass: author's other books


Who wrote Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach (Advanced Sciences and Technologies for Security Applications)? Find out the surname, the name of the author of the book and a list of all author's works by series.

Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach (Advanced Sciences and Technologies for Security Applications) — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach (Advanced Sciences and Technologies for Security Applications)" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Advanced Sciences and Technologies for Security Applications Series Editor - photo 1
Advanced Sciences and Technologies for Security Applications
Series Editor
Anthony J. Masys
Associate Professor, Director of Global Disaster Management, Humanitarian Assistance and Homeland Security, University of South Florida, Tampa, USA
Advisory Editors
Gisela Bichler
California State University, San Bernardino, CA, USA
Thirimachos Bourlai
Statler College of Engineering and Mineral Resources, West Virginia University, Morgantown, WV, USA
Chris Johnson
University of Glasgow, Glasgow, UK
Panagiotis Karampelas
Hellenic Air Force Academy, Attica, Greece
Christian Leuprecht
Royal Military College of Canada, Kingston, ON, Canada
Edward C. Morse
University of California, Berkeley, CA, USA
David Skillicorn
Queens University, Kingston, ON, Canada
Yoshiki Yamagata
National Institute for Environmental Studies, Tsukuba, Ibaraki, Japan

Indexed by SCOPUS

The series Advanced Sciences and Technologies for Security Applications comprises interdisciplinary research covering the theory, foundations and domain-specific topics pertaining to security. Publications within the series are peer-reviewed monographs and edited works in the areas of:
  • biological and chemical threat recognition and detection (e.g., biosensors, aerosols, forensics)

  • crisis and disaster management

  • terrorism

  • cyber security and secure information systems (e.g., encryption, optical and photonic systems)

  • traditional and non-traditional security

  • energy, food and resource security

  • economic security and securitization (including associated infrastructures)

  • transnational crime

  • human security and health security

  • social, political and psychological aspects of security

  • recognition and identification (e.g., optical imaging, biometrics, authentication and verification)

  • smart surveillance systems

  • applications of theoretical frameworks and methodologies (e.g., grounded theory, complexity, network sciences, modelling and simulation)

The series Advanced Sciences and Technologies for Security Applications comprises interdisciplinary research covering the theory, foundations and domain-specific topics pertaining to security. Publications within the series are peer-reviewed monographs and edited works in the areas of:

- biological and chemical threat recognition and detection (e.g., biosensors, aerosols, forensics) - crisis and disaster management - terrorism - cyber security and secure information systems (e.g., encryption, optical and photonic systems) - traditional and non-traditional security - energy, food and resource security - economic security and securitization (including associated infrastructures) - transnational crime - human security and health security- social, political and psychological aspects of security- recognition and identification (e.g., optical imaging, biometrics, authentication and verification)- smart surveillance systems- applications of theoretical frameworks and methodologies (e.g., grounded theory, complexity, network sciences, modelling and simulation)

Together, the high-quality contributions to this series provide a cross-disciplinary overview of forefront research endeavours aiming to make the world a safer place.

More information about this series at http://www.springer.com/series/5540 The editors encourage prospective authors to correspond with them in advance of submitting a manuscript. Submission of manuscripts should be made to the Editor-in-Chief or one of the Editors.

Stefan Rass , Stefan Schauer , Sandra Knig and Quanyan Zhu
Cyber-Security in Critical Infrastructures
A Game-Theoretic Approach
Stefan Rass University of Klagenfurt Klagenfurt Austria Stefan Schauer - photo 2
Stefan Rass
University of Klagenfurt, Klagenfurt, Austria
Stefan Schauer
Austrian Institute of Technology GmbH, Wien, Austria
Sandra Knig
Austrian Institute of Technology GmbH, Wien, Austria
Quanyan Zhu
Tandon School of Engineering, New York University, Brooklyn, NY, USA
ISSN 1613-5113 e-ISSN 2363-9466
Advanced Sciences and Technologies for Security Applications
ISBN 978-3-030-46907-8 e-ISBN 978-3-030-46908-5
https://doi.org/10.1007/978-3-030-46908-5
Springer Nature Switzerland AG 2020
This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG

The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

to our families

Contents
Part I Introduction
Part II Security Games
Part I Introduction
Springer Nature Switzerland AG 2020
S. Rass et al. Cyber-Security in Critical Infrastructures Advanced Sciences and Technologies for Security Applications https://doi.org/10.1007/978-3-030-46908-5_1
1. Introduction
Stefan Rass
(1)
Universitaet Klagenfurt, Klagenfurt, Austria
(2)
Austrian Institute of Technology GmbH, Wien, Austria
(3)
Tandon School of Engineering, New York University, Brooklyn, NY, USA
Stefan Rass (Corresponding author)
Stefan Schauer (Corresponding author)
Sandra Knig (Corresponding author)
Quanyan Zhu (Corresponding author)

The man who is a pessimist before 48 knows too much; if he is an optimist after it he knows too little. M. Twain

Abstract

This chapter opens the book by introducing the characteristics and particularities of critical infrastructures. Their existence and interplay forms a vital pillar of contemporary societies, and their protection is a top duty of governments and security research. Recent years have shown a paradigm shift of cyber-attacks from specific individual threat and attack scenarios, to a modern combination of various attack types and strategies to what we call an advanced persistent threat (APT) today. This term describes a diverse class of attacks that all share a set of common characteristics, which presents new challenges to security that demand urgent and continuous action by practitioners, researchers and every stakeholder of a critical infrastructure. The main focus of the book is describing game theory as a tool to establish security against APTs, and to this end, the introduction here starts with the abstract characteristics of an APT, showcasing them with a set of selected real-life documented cases of APTs that ends the chapter.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach (Advanced Sciences and Technologies for Security Applications)»

Look at similar books to Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach (Advanced Sciences and Technologies for Security Applications). We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach (Advanced Sciences and Technologies for Security Applications)»

Discussion, reviews of the book Cyber-Security in Critical Infrastructures: A Game-Theoretic Approach (Advanced Sciences and Technologies for Security Applications) and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.