Critical infrastructure security and resilience : theories, methods, tools and technologies /: theories, methods, tools and technologies. ([2019])
- Record Type:
- Book
- Title:
- Critical infrastructure security and resilience : theories, methods, tools and technologies /: theories, methods, tools and technologies. ([2019])
- Main Title:
- Critical infrastructure security and resilience : theories, methods, tools and technologies
- Further Information:
- Note: Editors, Dimitris Gritzalis, Marianthi Theocharidou and George Stergiopoulos.
- Other Names:
- Gritzalis, Dimitris
Theocharidou, Marianthi
Stergiopoulos, George - Contents:
- Intro; Contents; Part I Governance & Risk Management; Resilience Approach to Critical Information Infrastructures; 1 Introduction; 2 Definitions; 3 Analysis of CI, CII and NIS Policies and CII Elements; 4 Conceptual Model; 5 Conclusion and Recommendations; References; Methodologies and Strategies for Critical Infrastructure Protection; 1 Introduction; 2 Methodologies for Identifying and Evaluating Critical Infrastructures (CIs); 2.1 Critical Infrastructure Identification; 2.1.1 Identification of Critical Sectors/Subsectors; 2.1.2 Identification of Critical Services 2.2 Dependencies and Interdependencies2.3 Criteria for Critical Service/Infrastructure Assessment; 2.3.1 Sectorial Criteria; 2.3.2 Cross-Cutting Criteria; 2.3.3 Combination of Sectoral and Cross-Cutting Criteria; 3 Best Practices in European Countries; 3.1 France; 3.2 Germany; 3.3 Great Britain; 4 United States of America (USA); 5 Critical Infrastructure Protection Strategy; 6 Conclusions; References; Risk Analysis for Critical Infrastructure Protection; 1 Introduction; 2 What Is Critical Infrastructure?; 3 Critical Infrastructure Protection; 4 NIPP & RMF; 5 RAMCAP; 6 DWRP; 7 LIRA 8 Are We There Yet?9 Conclusion; References; Risk-Based Analysis of the Vulnerability of Urban Infrastructure to the Consequences of Climate Change; 1 Introduction; 2 Risk and Vulnerability Assessments -- Essential Concepts; 3 State of the Art; 4 The RESIN Project -- Overview; 5 Risk-Based Vulnerability Assessment: IVAVIA; 5.1 QualitativIntro; Contents; Part I Governance & Risk Management; Resilience Approach to Critical Information Infrastructures; 1 Introduction; 2 Definitions; 3 Analysis of CI, CII and NIS Policies and CII Elements; 4 Conceptual Model; 5 Conclusion and Recommendations; References; Methodologies and Strategies for Critical Infrastructure Protection; 1 Introduction; 2 Methodologies for Identifying and Evaluating Critical Infrastructures (CIs); 2.1 Critical Infrastructure Identification; 2.1.1 Identification of Critical Sectors/Subsectors; 2.1.2 Identification of Critical Services 2.2 Dependencies and Interdependencies2.3 Criteria for Critical Service/Infrastructure Assessment; 2.3.1 Sectorial Criteria; 2.3.2 Cross-Cutting Criteria; 2.3.3 Combination of Sectoral and Cross-Cutting Criteria; 3 Best Practices in European Countries; 3.1 France; 3.2 Germany; 3.3 Great Britain; 4 United States of America (USA); 5 Critical Infrastructure Protection Strategy; 6 Conclusions; References; Risk Analysis for Critical Infrastructure Protection; 1 Introduction; 2 What Is Critical Infrastructure?; 3 Critical Infrastructure Protection; 4 NIPP & RMF; 5 RAMCAP; 6 DWRP; 7 LIRA 8 Are We There Yet?9 Conclusion; References; Risk-Based Analysis of the Vulnerability of Urban Infrastructure to the Consequences of Climate Change; 1 Introduction; 2 Risk and Vulnerability Assessments -- Essential Concepts; 3 State of the Art; 4 The RESIN Project -- Overview; 5 Risk-Based Vulnerability Assessment: IVAVIA; 5.1 Qualitativ Stage; 5.2 Quantitative Stage; 5.3 Presentation; 5.4 Supporting IT Tools; 6 The RESIN City Case Studies; 7 IVAVIA Results for RESIN Cities; 8 Climate Change-Related Risk to Critical Infrastructures; 9 Conclusion; References Game-Theoretic Decision Making for the Resilience of Interdependent Infrastructures Exposed to Disruptions1 Introduction; 2 Operational Models of Interdependent Infrastructures; 2.1 Optimization-Based System Operation Model; 2.2 Infrastructure Interdependency Model; 3 System Resilience Under Disruptions; 3.1 Impact Models of Disruptions; 3.2 Resilience Assessment; 3.3 Resilience Improvement; 4 Numerical Example; 5 Concluding Remarks; References; Smallest Pseudo Target Set Identification and Related Problems Using the Implicative Interdependency Model; 1 Introduction; 2 Related Work … (more)
- Publisher Details:
- Cham, Switzerland : Springer Nature
- Publication Date:
- 2019
- Copyright Date:
- 2019
- Extent:
- 1 online resource
- Subjects:
- 004
Computer science
Cyber intelligence (Computer security)
Computer security -- Government policy
COMPUTERS / Computer Literacy
COMPUTERS / Computer Science
COMPUTERS / Data Processing
COMPUTERS / Hardware / General
COMPUTERS / Information Technology
COMPUTERS / Machine Theory
COMPUTERS / Reference
Electronic books - Languages:
- English
- ISBNs:
- 9783030000240
3030000249 - Related ISBNs:
- 9783030000233
- Notes:
- Note: Includes bibliographical references.
Note: Online resource; title from PDF title page (EBSCO, viewed January 9, 2019). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.382145
- Ingest File:
- 02_365.xml