Advertisement

Critical Infrastructure Protection

Information Infrastructure Models, Analysis, and Defense

  • Javier Lopez
  • Roberto Setola
  • Stephen D. Wolthusen

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7130)

Table of contents

  1. Front Matter
  2. Introduction to Critical Information Infrastructure Protection

    1. Javier Lopez, Roberto Setola, Stephen D. Wolthusen
      Pages 1-14
    2. Myriam Dunn Cavelty, Manuel Suter
      Pages 15-38
    3. Andrea Glorioso, Andrea Servida
      Pages 39-51
  3. Models and Defensive Mechanisms

    1. Nils Kalstad Svendsen, Stephen D. Wolthusen
      Pages 68-97
    2. Massimiliano Raciti, Jordi Cucurull, Simin Nadjm-Tehrani
      Pages 98-119
  4. Control Systems and Protocols

    1. Cristina Alcaraz, Gerardo Fernandez, Fernando Carvajal
      Pages 120-149
    2. Julian L. Rrushi
      Pages 150-176
    3. Abdelmajid Khelil, Daniel Germanus, Neeraj Suri
      Pages 177-196
  5. Infrastructure Sector Studies

    1. Ettore Bompard, Paolo Cuccia, Marcelo Masera, Igor Nai Fovino
      Pages 197-234
    2. Stuart Goldman, Huseyin Uzunalioglu
      Pages 280-300
    3. Bernhard Hämmerli
      Pages 301-329
    4. Mark Hartong, Rajn Goel, Duminda Wijesekera
      Pages 330-355
  6. Back Matter

About this book

Introduction

The present volume aims to provide an overview of the current understanding of the so-called Critical Infrastructure (CI), and particularly the Critical Information Infrastructure (CII), which not only forms one of the constituent sectors of the overall CI, but also is unique in providing an element of interconnection
between sectors as well as often also intra-sectoral control mechanisms.
The 14 papers of this book present a collection of  pieces of scientific work in the areas of critical infrastructure protection. In combining elementary concepts and models with policy-related issues on one hand and placing an emphasis on the timely area of control systems, the book aims to highlight some of the key issues facing the research community.

Keywords

cyber terrorism cybersecurity policy protection goals resilience and robustness threat perception

Editors and affiliations

  • Javier Lopez
    • 1
  • Roberto Setola
    • 2
  • Stephen D. Wolthusen
    • 3
  1. 1.Department of Computer ScienceUniversity of MalagaMálagaSpain
  2. 2.Complex Systems & Security LabUniversity CAMPUS Bio-MedicoRomaItaly
  3. 3.Information Security Group, Department of MathematicsUniversity of LondonEghamUK

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-28920-0
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-28919-4
  • Online ISBN 978-3-642-28920-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering