Resilience of cyber-physical systems : from risk modelling to threat counteraction /: from risk modelling to threat counteraction. (2019)
- Record Type:
- Book
- Title:
- Resilience of cyber-physical systems : from risk modelling to threat counteraction /: from risk modelling to threat counteraction. (2019)
- Main Title:
- Resilience of cyber-physical systems : from risk modelling to threat counteraction
- Further Information:
- Note: Francesco Flammini, editor.
- Editors:
- Flammini, Francesco
- Contents:
- Intro; Foreword; Preface; Contents; Editorial Advisory Board; Additional Reviewers; Part I Challenges and Frameworks; Complex, Resilient and Smart Systems; 1 Introduction: From Automated Machine to Autonomous Smart Machine; 2 Usability, Environmental Performance, Smartness and Resilience; 2.1 Usability Index and the Usability Index of Machine -- UIoM; 2.2 Environmental Performance Index of Machines -- EPIoM; 3 The Implementation of Complex, Resilient and Smart Systems; 3.1 Smart Device -- Smart Agent; 3.2 Smart Systems -- Smart Multi-agent Systems 3.3 Smart Complex Systems Network -- Ad-hoc Networked Smart Multi-agent System Sociograms4 From Machine Intelligence Theory to Smart Machine Theory; 4.1 Smart Cyberspace Theory -- The Intelligent Cyberspace and the Smart Cyberspace; 5 Smartness Theory, Smartness Quotient; 6 Conclusion; References; Challenges and Opportunities for Model-Based Security Risk Assessment of Cyber-Physical Systems; 1 Introduction; 1.1 Structure; 2 Background and Open Challenges; 2.1 Cyber-Security Risk Assessment Methodologies; 2.2 CPS Design Languages for Security; 2.3 Open Challenges 3 Model-Driven Cyber-Security Risk Assessment3.1 CPS Formal Model and Abstraction Level; 3.2 Attacker Models; 3.2.1 Profiling the Attacker; 3.3 Vulnerability and Cost Models; 3.3.1 Mitigation/Exploitation Cost of Vulnerability Exploits; 3.3.2 A High-Level Representation of Vulnerabilities; 4 A Vision for CPS Security Risk Assessment; 5 Conclusion; References; AIntro; Foreword; Preface; Contents; Editorial Advisory Board; Additional Reviewers; Part I Challenges and Frameworks; Complex, Resilient and Smart Systems; 1 Introduction: From Automated Machine to Autonomous Smart Machine; 2 Usability, Environmental Performance, Smartness and Resilience; 2.1 Usability Index and the Usability Index of Machine -- UIoM; 2.2 Environmental Performance Index of Machines -- EPIoM; 3 The Implementation of Complex, Resilient and Smart Systems; 3.1 Smart Device -- Smart Agent; 3.2 Smart Systems -- Smart Multi-agent Systems 3.3 Smart Complex Systems Network -- Ad-hoc Networked Smart Multi-agent System Sociograms4 From Machine Intelligence Theory to Smart Machine Theory; 4.1 Smart Cyberspace Theory -- The Intelligent Cyberspace and the Smart Cyberspace; 5 Smartness Theory, Smartness Quotient; 6 Conclusion; References; Challenges and Opportunities for Model-Based Security Risk Assessment of Cyber-Physical Systems; 1 Introduction; 1.1 Structure; 2 Background and Open Challenges; 2.1 Cyber-Security Risk Assessment Methodologies; 2.2 CPS Design Languages for Security; 2.3 Open Challenges 3 Model-Driven Cyber-Security Risk Assessment3.1 CPS Formal Model and Abstraction Level; 3.2 Attacker Models; 3.2.1 Profiling the Attacker; 3.3 Vulnerability and Cost Models; 3.3.1 Mitigation/Exploitation Cost of Vulnerability Exploits; 3.3.2 A High-Level Representation of Vulnerabilities; 4 A Vision for CPS Security Risk Assessment; 5 Conclusion; References; A Comprehensive Framework for the Security Risk Management of Cyber-Physical Systems; 1 Introduction; 2 Aspects and Requirements; 2.1 Cyber Physical System Security; 2.2 Threats and Vulnerabilities; 2.3 Security Requirements 2.4 Dependencies and Accumulated Risk3 A Comprehensive Framework for the Risk Management- Cybersecurity in CPS; 3.1 System Functional Modeling (Asset Modeling); 3.2 Threat Selection and Modeling; 3.3 Risk Management Plan; 3.4 Safeguard Implementation: Operations; 3.5 Vulnerability Assessment; 3.6 Compliance; 3.7 Maintenance and Improvements; 4 Case Study: Adopting the Framework by Ansaldo STS Company; 4.1 System Functional Model; 4.2 Threat Modeling and Selection: Using RMAT Software; 4.3 Conducting Risk Management Study Using MAGERIT Method; 4.4 Safeguard Implementation 4.5 Vulnerability Assessment for Cyber Assets4.6 Compliance; 4.7 Maintenance and Improvement; 5 Conclusion; References; Part II Evaluation Methodologies and Tools; Supporting Cybersecurity Compliance Assessment of Industrial Automation and Control System Components; 1 Introduction; 2 Related Works; 3 Introduction to IEC 62443; 4 Case Study: Remote Terminal Unit; 4.1 Component Description; 4.2 Protection Profile of RTU; 5 Support for Representing Security Requirements; 5.1 Representing Conformance Arguments; 5.2 From Security Functions to Component Requirements … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2019
- Extent:
- 1 online resource (xvii, 229 pages), illustrations (some color)
- Subjects:
- 006.2/2
Cooperating objects (Computer systems)
Electronic books
Electronic books - Languages:
- English
- ISBNs:
- 9783319955971
3319955977 - Related ISBNs:
- 9783319955964
- Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed January 31, 2019).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.384319
- Ingest File:
- 02_371.xml