Abstract
Our life is moving to the digital world. The changing landscapes of life are forcing us to change the way we deal with things. Living in an always on and always connected world makes our life easier and more convenient. Smart homes automatically adapt to the environmental conditions with respect to heating and cooling; smart cars adapt to traffic conditions and situations (e.g., accident or congestion); smart health systems monitor our health condition and smart entertainment adapts to our mood. A lot of “smart things” make our lives more convenient. Social networks, online banking, e-health, e-marketplaces are other examples of the networked society.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Khurana, H., Hadley, M., Lu, N., Frincke, D.A.: Smart-Grid Security Issues. IEEE Security & Privacy Magazine 8, 81–85 (2010)
Ray, D., Harnoor, R., Hentea, M.: Smart power grid security: A unified risk management approach. In: 2010 IEEE International Carnahan Conference on Security Technology (ICCST), pp. 276–285. IEEE (2010)
Metke, A.R., Ekl, R.L.: Security technology for smart grid networks. IEEE Transactions on Smart Grid 1, 99–107 (2010)
Kargl, F., Papadimitratos, P., Buttyan, L., Müter, M., Schoch, E., Wiedersheim, B., Thong, T.-V., Calandriello, G., Held, A., Kung, A., Hubaux, J.-P.: Secure vehicular communication systems: implementation, performance, and research challenges. IEEE Communications Magazine 46, 110–118 (2008)
Fischer-Hübner, S.: IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms. LNCS, p. 351. Springer (2001) ISBN 9783540421429
Mouratidis, H., Giorgini, P., Manson, G.: Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems. In: Eder, J., Missikoff, M. (eds.) CAiSE 2003. LNCS, vol. 2681, pp. 63–78. Springer, Heidelberg (2003)
Swanson, M.: Security self-assessment guide for information technology system, US Department of Commerce, Computer Security Division, Information Technology, National Institute of Standards and Technology, ASIN B002WJINW4, p. 108 (2001)
Szor, P.: The Art of Computer Virus Research and Defense. Addison-Wesley, p. 744 (2005) ISBN 0321304543
Weaver, N., Paxson, V., Staniford, S., Cunningham, R.: A taxonomy of computer worms. In: Proceedings of the 2003 ACM Workshop on Rapid Malcode, pp. 11–18. ACM, New York (2003)
Trend Micro, Threat Report (2007), http://www.trend.com.tw/micro/webthreat/2007_threat_report_2008_threat_and_technology_forecast.pdf
Carcano, A., Coletta, A., Guglielmi, M., Masera, M., Fovino, N., Trombetta, A.: A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems. IEEE Transactions on Industrial Informatics 7, 1 (2011)
Symantec, Report on Attack Toolkits and Malicious Websites, http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=attackkits
Neosploit exploit toolkit, http://dxp2532.blogspot.com/2007/12/neosploit-exploit-toolkit.html
The BlackHole Theory, http://www.symantec.com/connect/blogs/blackhole-theory
Young, A.: Cryptovirology: extortion-based security threats and countermeasures. In: Proceedings 1996 IEEE Symposium on Security and Privacy, pp. 129–140 (1996)
Balduzzi, M., Platzer, C., Holz, T., Kirda, E., Balzarotti, D., Kruegel, C.: Abusing Social Networks for Automated User Profiling. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 422–441. Springer, Heidelberg (2010)
Ianelli, N., Hackworth, A.: Botnets as a vehicle for online crime. CERT Coordination Center, pp. 1–28 (2005)
Ard, C.: Botnet Analysis. Forensic Computer Science IJoFCS 2, 65 (2007)
Krebs, B.: Shadowy Russian Firm seen as Conduit for Cybercrime. Washington Post A15 (October 13, 2007)
Demchenko, Gommans, L., de Laat, C., Oudenaarde, B. : Web services and grid security vulnerabilities and threats analysis and model. In: Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing, pp. 262–267 (2005)
Targeted Attacks, https://info-point-security.com/images/stories/2010/Symantec_targeted_attacks_2.jpg
Richardson, R.: CSI computer crime and security survey. In: Computer Security Institute, pp. 1–28 (2007)
Anagnostakis, K.G., Sidiroglou, S., Akritidis, P., Xinidis, K., Markatos, E., Keromytis, A.D.: Detecting targeted attacks using shadow honeypots. In: Proceedings of the 14th Conference on USENIX Security Symposium, vol. 14, p. 9 (2005)
Guha, R.K., Furqan, Z., Muhammad, S.: Discovering Man-in-the-Middle Attacks in Authentication Protocols. In: Military Communications Conference, MILCOM 2007, pp. 1–7. IEEE (2007)
Corporate Trust, Studie: Industriespionage - Die Schäden durch Spionage in der deutschen Wirtschaft, Munich pp. 1–56 (2007), http://www.corporate-trust.de/pdf/STUDIE_191107.pdf
Bussmann, K., Krieg, O., Nestler, C., Salvenmoser, S., Schroth, A., Theile, A., Trunk, D.: Wirtschaftskriminalität 2009 Sicherheitslage in deutschen Großunternehmen. In: Martin-Luther-Universität Halle-Wittenberg and PwC AG, pp. 1–65 (2009), http://www.pwc.de/de/risiko-management/.../Studie-Wirtschaftskriminal-09.pdf
Falliere, N., Murchu, L.O., Chien, E.: W32. stuxnet dossier. Symantec Security Response, 1–69 (2011), http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf
Roesch, M.: Snort-lightweight intrusion detection for networks. In: Proceedings of the 13th USENIX Conference on System Administration, Seattle, Washington, pp. 229–238 (1999)
Noecker, G.: now: Network on Wheels, http://www.net-on-wheels.de
The Secure Vehicle Communication (SeVeCOM) Project, http://www.sevecom.org/
Car 2 Car City Scenario, http://www.car-to-car.org/uploads/pics/BMW_3D_Car2Car_CityScenario.jpg
ENISA, Why is awareness raising, Article, pp. 1–2, http://www.enisa.europa.eu/media/key-documents/fact-sheets/Awareness-1.pdf
Schönwälder, J., Fouquet, M., Dreo Rodosek, G., Hochstatter, I.: Future internet= content+ services+ management. IEEE Communications Magazine 47, 27–33 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Rodosek, G.D., Golling, M. (2013). Cyber Security: Challenges and Application Areas. In: Essig, M., Hülsmann, M., Kern, EM., Klein-Schmeink, S. (eds) Supply Chain Safety Management. Lecture Notes in Logistics. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32021-7_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-32021-7_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32020-0
Online ISBN: 978-3-642-32021-7
eBook Packages: Business and EconomicsBusiness and Management (R0)