Skip to main content

Cyber Security: Challenges and Application Areas

  • Chapter

Part of the book series: Lecture Notes in Logistics ((LNLO))

Abstract

Our life is moving to the digital world. The changing landscapes of life are forcing us to change the way we deal with things. Living in an always on and always connected world makes our life easier and more convenient. Smart homes automatically adapt to the environmental conditions with respect to heating and cooling; smart cars adapt to traffic conditions and situations (e.g., accident or congestion); smart health systems monitor our health condition and smart entertainment adapts to our mood. A lot of “smart things” make our lives more convenient. Social networks, online banking, e-health, e-marketplaces are other examples of the networked society.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Khurana, H., Hadley, M., Lu, N., Frincke, D.A.: Smart-Grid Security Issues. IEEE Security & Privacy Magazine 8, 81–85 (2010)

    Article  Google Scholar 

  2. Ray, D., Harnoor, R., Hentea, M.: Smart power grid security: A unified risk management approach. In: 2010 IEEE International Carnahan Conference on Security Technology (ICCST), pp. 276–285. IEEE (2010)

    Google Scholar 

  3. Metke, A.R., Ekl, R.L.: Security technology for smart grid networks. IEEE Transactions on Smart Grid 1, 99–107 (2010)

    Article  Google Scholar 

  4. Kargl, F., Papadimitratos, P., Buttyan, L., Müter, M., Schoch, E., Wiedersheim, B., Thong, T.-V., Calandriello, G., Held, A., Kung, A., Hubaux, J.-P.: Secure vehicular communication systems: implementation, performance, and research challenges. IEEE Communications Magazine 46, 110–118 (2008)

    Article  Google Scholar 

  5. Fischer-Hübner, S.: IT-Security and Privacy: Design and Use of Privacy-Enhancing Security Mechanisms. LNCS, p. 351. Springer (2001) ISBN 9783540421429

    Google Scholar 

  6. Mouratidis, H., Giorgini, P., Manson, G.: Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems. In: Eder, J., Missikoff, M. (eds.) CAiSE 2003. LNCS, vol. 2681, pp. 63–78. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  7. Swanson, M.: Security self-assessment guide for information technology system, US Department of Commerce, Computer Security Division, Information Technology, National Institute of Standards and Technology, ASIN B002WJINW4, p. 108 (2001)

    Google Scholar 

  8. Szor, P.: The Art of Computer Virus Research and Defense. Addison-Wesley, p. 744 (2005) ISBN 0321304543

    Google Scholar 

  9. Weaver, N., Paxson, V., Staniford, S., Cunningham, R.: A taxonomy of computer worms. In: Proceedings of the 2003 ACM Workshop on Rapid Malcode, pp. 11–18. ACM, New York (2003)

    Chapter  Google Scholar 

  10. Trend Micro, Threat Report (2007), http://www.trend.com.tw/micro/webthreat/2007_threat_report_2008_threat_and_technology_forecast.pdf

  11. Carcano, A., Coletta, A., Guglielmi, M., Masera, M., Fovino, N., Trombetta, A.: A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems. IEEE Transactions on Industrial Informatics 7, 1 (2011)

    Article  Google Scholar 

  12. Symantec, Report on Attack Toolkits and Malicious Websites, http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=attackkits

  13. Neosploit exploit toolkit, http://dxp2532.blogspot.com/2007/12/neosploit-exploit-toolkit.html

  14. The BlackHole Theory, http://www.symantec.com/connect/blogs/blackhole-theory

  15. Young, A.: Cryptovirology: extortion-based security threats and countermeasures. In: Proceedings 1996 IEEE Symposium on Security and Privacy, pp. 129–140 (1996)

    Google Scholar 

  16. Balduzzi, M., Platzer, C., Holz, T., Kirda, E., Balzarotti, D., Kruegel, C.: Abusing Social Networks for Automated User Profiling. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 422–441. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  17. Ianelli, N., Hackworth, A.: Botnets as a vehicle for online crime. CERT Coordination Center, pp. 1–28 (2005)

    Google Scholar 

  18. Ard, C.: Botnet Analysis. Forensic Computer Science IJoFCS 2, 65 (2007)

    Article  Google Scholar 

  19. Krebs, B.: Shadowy Russian Firm seen as Conduit for Cybercrime. Washington Post A15 (October 13, 2007)

    Google Scholar 

  20. Demchenko, Gommans, L., de Laat, C., Oudenaarde, B. : Web services and grid security vulnerabilities and threats analysis and model. In: Proceedings of the 6th IEEE/ACM International Workshop on Grid Computing, pp. 262–267 (2005)

    Google Scholar 

  21. Targeted Attacks, https://info-point-security.com/images/stories/2010/Symantec_targeted_attacks_2.jpg

  22. Richardson, R.: CSI computer crime and security survey. In: Computer Security Institute, pp. 1–28 (2007)

    Google Scholar 

  23. Anagnostakis, K.G., Sidiroglou, S., Akritidis, P., Xinidis, K., Markatos, E., Keromytis, A.D.: Detecting targeted attacks using shadow honeypots. In: Proceedings of the 14th Conference on USENIX Security Symposium, vol. 14, p. 9 (2005)

    Google Scholar 

  24. Guha, R.K., Furqan, Z., Muhammad, S.: Discovering Man-in-the-Middle Attacks in Authentication Protocols. In: Military Communications Conference, MILCOM 2007, pp. 1–7. IEEE (2007)

    Google Scholar 

  25. Corporate Trust, Studie: Industriespionage - Die Schäden durch Spionage in der deutschen Wirtschaft, Munich pp. 1–56 (2007), http://www.corporate-trust.de/pdf/STUDIE_191107.pdf

  26. Bussmann, K., Krieg, O., Nestler, C., Salvenmoser, S., Schroth, A., Theile, A., Trunk, D.: Wirtschaftskriminalität 2009 Sicherheitslage in deutschen Großunternehmen. In: Martin-Luther-Universität Halle-Wittenberg and PwC AG, pp. 1–65 (2009), http://www.pwc.de/de/risiko-management/.../Studie-Wirtschaftskriminal-09.pdf

  27. Falliere, N., Murchu, L.O., Chien, E.: W32. stuxnet dossier. Symantec Security Response, 1–69 (2011), http://www.symantec.com/content/en/us/enterprise/media/security_response/whitepapers/w32_stuxnet_dossier.pdf

  28. Roesch, M.: Snort-lightweight intrusion detection for networks. In: Proceedings of the 13th USENIX Conference on System Administration, Seattle, Washington, pp. 229–238 (1999)

    Google Scholar 

  29. Noecker, G.: now: Network on Wheels, http://www.net-on-wheels.de

  30. The Secure Vehicle Communication (SeVeCOM) Project, http://www.sevecom.org/

  31. Car 2 Car City Scenario, http://www.car-to-car.org/uploads/pics/BMW_3D_Car2Car_CityScenario.jpg

  32. ENISA, Why is awareness raising, Article, pp. 1–2, http://www.enisa.europa.eu/media/key-documents/fact-sheets/Awareness-1.pdf

  33. Schönwälder, J., Fouquet, M., Dreo Rodosek, G., Hochstatter, I.: Future internet= content+ services+ management. IEEE Communications Magazine 47, 27–33 (2009)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gabi Dreo Rodosek .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Rodosek, G.D., Golling, M. (2013). Cyber Security: Challenges and Application Areas. In: Essig, M., Hülsmann, M., Kern, EM., Klein-Schmeink, S. (eds) Supply Chain Safety Management. Lecture Notes in Logistics. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32021-7_11

Download citation

Publish with us

Policies and ethics