Ebook: Critical Infrastructure Protection
Author: Neil Robinson Lorenzo Valeri (auth.) Associate Director Eric Goetz Professor Sujeet Shenoi (eds.)
- Tags: Computer Science general
- Series: IFIP International Federation for Information Processing 253
- Year: 2007
- Publisher: Springer US
- Edition: 1
- Language: English
- pdf
The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed.
Critical Infrastructure Protection describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include:
- Themes and Issues
- Infrastructure Security
- Control Systems Security
- Network Infrastructure Security
- Infrastructure Interdependencies
- Risk Assessment
This book is the first volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty-seven edited papers from the First Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at Dartmouth College, Hanover, New Hampshire, USA in the spring of 2007.
Critical Infrastructure Protection is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.
Eric Goetz is the Associate Director for Research at the Institute for Information Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA.
Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.
The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed.
Critical Infrastructure Protection describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include:
- Themes and Issues
- Infrastructure Security
- Control Systems Security
- Network Infrastructure Security
- Infrastructure Interdependencies
- Risk Assessment
This book is the first volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty-seven edited papers from the First Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at Dartmouth College, Hanover, New Hampshire, USA in the spring of 2007.
Critical Infrastructure Protection is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.
Eric Goetz is the Associate Director for Research at the Institute for Information Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA.
Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.
The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed.
Critical Infrastructure Protection describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include:
- Themes and Issues
- Infrastructure Security
- Control Systems Security
- Network Infrastructure Security
- Infrastructure Interdependencies
- Risk Assessment
This book is the first volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty-seven edited papers from the First Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at Dartmouth College, Hanover, New Hampshire, USA in the spring of 2007.
Critical Infrastructure Protection is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.
Eric Goetz is the Associate Director for Research at the Institute for Information Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA.
Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.
Content:
Front Matter....Pages i-xx
On the Security Implications of Disruptive Technologies....Pages 3-14
Cyber Security: Are Economic Incentives Adequate?....Pages 15-27
Government Intervention in Information Infrastructure Protection....Pages 29-39
Security of Information Flow in the Electric Power Grid....Pages 43-56
Securing Positive Train Control Systems....Pages 57-72
Lessons Learned from the Maroochy Water Breach....Pages 73-82
Reducing Risk in Oil and Gas Production Operations....Pages 83-95
Securing Current and Future Process Control Systems....Pages 99-115
Security Strategies for SCADA Networks....Pages 117-131
Security Enhancements for Distributed Control Systems....Pages 133-146
Security Challenges of Reconfigurable Devices in the Power Grid....Pages 147-160
Intrusion Detection and Event Monitoring in SCADA Networks....Pages 161-173
Passive Scanning in Modbus Networks....Pages 175-187
Formal Modeling and Analysis of the Modbus Protocol....Pages 189-204
Security Analysis of Multilayer SCADA Protocols....Pages 205-221
Remote Forensic Analysis of Process Control Systems....Pages 223-235
Creating a European SCADA Security Testbed....Pages 237-247
Protecting Internet Services from Low-Rate DoS Attacks....Pages 251-265
Detecting Wormhole Attacks in Wireless Sensor Networks....Pages 267-279
Detecting Non-Discoverable Bluetooth Devices....Pages 281-293
Risk Analysis in Interdependent Infrastructures....Pages 297-310
Analysis of Interdependencies Between Italy's Economic Sectors....Pages 311-321
The ISE Metamodel for Critical Infrastructures....Pages 323-336
Multigraph Dependency Models for Heterogeneous Infrastructures....Pages 337-350
Visualizing Cascading Failures in Critical Cyber Infrastructures....Pages 351-364
A Service-Oriented Approach for Assessing Infrastructure Security....Pages 367-379
Analysis of Electrical Power and Oil and Gas Pipeline Failures....Pages 381-394
The information infrastructure---comprising computers, embedded devices, networks and software systems---is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed.
Critical Infrastructure Protection describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include:
- Themes and Issues
- Infrastructure Security
- Control Systems Security
- Network Infrastructure Security
- Infrastructure Interdependencies
- Risk Assessment
This book is the first volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty-seven edited papers from the First Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at Dartmouth College, Hanover, New Hampshire, USA in the spring of 2007.
Critical Infrastructure Protection is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.
Eric Goetz is the Associate Director for Research at the Institute for Information Infrastructure Protection, Dartmouth College, Hanover, New Hampshire, USA.
Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.
Content:
Front Matter....Pages i-xx
On the Security Implications of Disruptive Technologies....Pages 3-14
Cyber Security: Are Economic Incentives Adequate?....Pages 15-27
Government Intervention in Information Infrastructure Protection....Pages 29-39
Security of Information Flow in the Electric Power Grid....Pages 43-56
Securing Positive Train Control Systems....Pages 57-72
Lessons Learned from the Maroochy Water Breach....Pages 73-82
Reducing Risk in Oil and Gas Production Operations....Pages 83-95
Securing Current and Future Process Control Systems....Pages 99-115
Security Strategies for SCADA Networks....Pages 117-131
Security Enhancements for Distributed Control Systems....Pages 133-146
Security Challenges of Reconfigurable Devices in the Power Grid....Pages 147-160
Intrusion Detection and Event Monitoring in SCADA Networks....Pages 161-173
Passive Scanning in Modbus Networks....Pages 175-187
Formal Modeling and Analysis of the Modbus Protocol....Pages 189-204
Security Analysis of Multilayer SCADA Protocols....Pages 205-221
Remote Forensic Analysis of Process Control Systems....Pages 223-235
Creating a European SCADA Security Testbed....Pages 237-247
Protecting Internet Services from Low-Rate DoS Attacks....Pages 251-265
Detecting Wormhole Attacks in Wireless Sensor Networks....Pages 267-279
Detecting Non-Discoverable Bluetooth Devices....Pages 281-293
Risk Analysis in Interdependent Infrastructures....Pages 297-310
Analysis of Interdependencies Between Italy's Economic Sectors....Pages 311-321
The ISE Metamodel for Critical Infrastructures....Pages 323-336
Multigraph Dependency Models for Heterogeneous Infrastructures....Pages 337-350
Visualizing Cascading Failures in Critical Cyber Infrastructures....Pages 351-364
A Service-Oriented Approach for Assessing Infrastructure Security....Pages 367-379
Analysis of Electrical Power and Oil and Gas Pipeline Failures....Pages 381-394
....