000 04086nam a22005775i 4500
001 978-3-030-91293-2
003 DE-He213
005 20240423125542.0
007 cr nn 008mamaa
008 220402s2022 sz | s |||| 0|eng d
020 _a9783030912932
_9978-3-030-91293-2
024 7 _a10.1007/978-3-030-91293-2
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aCyber Security
_h[electronic resource] :
_bCritical Infrastructure Protection /
_cedited by Martti Lehto, Pekka Neittaanmäki.
250 _a1st ed. 2022.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2022.
300 _aXVI, 484 p. 73 illus., 63 illus. in color.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aComputational Methods in Applied Sciences,
_x2543-0203 ;
_v56
505 0 _aPart I: Digital society. Chapter 1: Cyber-attacks Against Critical Infrastructure -- Chapter 2: Key Elements of On-line Cyber Security Exercise and Survey of Learning During the On-line Cyber Security Exercise -- Chapter 3: Cyber Law and Regulation -- Chapter 4: Understanding and Gaining Human Resilience Against Negative Effects of Digitalization -- Chapter 5: Users’ Psychopathologies: Impact on Cybercrime Vulnerabilities and Cybersecurity Behavior -- Chapter 6: Process Ontology Approach to Military Influence Operations -- Part II: Critical infrastructure protection. Chapter 7: Future Smart Societies’ Infrastructures and Services in the Cyber Environments -- Chapter 8: Cyber Security in Healthcare Systems -- Chapter 9: Cyber Security of an Electric Power System in Critical Infrastructure -- Chapter 10: Maritime Cybersecurity: Meeting Threats to Globalization’s Great Conveyor.
520 _aThis book focus on critical infrastructure protection. The chapters present detailed analysis of the issues and challenges in cyberspace and provide novel solutions in various aspects. The first part of the book focus on digital society, addressing critical infrastructure and different forms of the digitalization, strategic focus on cyber security, legal aspects on cyber security, citizen in digital society, and cyber security training. The second part focus on the critical infrastructure protection in different areas of the critical infrastructure. The chapters cover the cybersecurity situation awareness, aviation and air traffic control, cyber security in smart societies and cities, cyber security in smart buildings, maritime cyber security, cyber security in energy systems, and cyber security in healthcare. The third part presents the impact of new technologies upon cyber capability building as well as new challenges brought about by new technologies. These new technologies are among others are quantum technology, firmware and wireless technologies, malware analysis, virtualization.
650 0 _aData protection.
650 0 _aComputer crimes.
650 0 _aCooperating objects (Computer systems).
650 1 4 _aData and Information Security.
650 2 4 _aCybercrime.
650 2 4 _aCyber-Physical Systems.
700 1 _aLehto, Martti.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aNeittaanmäki, Pekka.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783030912925
776 0 8 _iPrinted edition:
_z9783030912949
776 0 8 _iPrinted edition:
_z9783030912956
830 0 _aComputational Methods in Applied Sciences,
_x2543-0203 ;
_v56
856 4 0 _uhttps://doi.org/10.1007/978-3-030-91293-2
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c179200
_d179200