Preface |
|
xv | |
|
Part I Fundamentals of Security Risk and Vulnerability Assessment |
|
|
|
1 Model-based risk analysis for critical infrastructures |
|
|
3 | (18) |
|
|
3 | (2) |
|
2 The critical infrastructure problem |
|
|
5 | (1) |
|
|
6 | (2) |
|
4 Multi-criterion tools (CARVER and MSRAM) |
|
|
8 | (2) |
|
|
8 | (1) |
|
|
9 | (1) |
|
|
10 | (4) |
|
|
11 | (2) |
|
|
13 | (1) |
|
|
14 | (4) |
|
|
15 | (1) |
|
|
16 | (2) |
|
|
18 | (3) |
|
2 Physical vulnerability assessment |
|
|
21 | (18) |
|
|
21 | (2) |
|
|
21 | (1) |
|
|
22 | (1) |
|
2 Common techniques for finding vulnerabilities |
|
|
23 | (5) |
|
|
23 | (1) |
|
|
23 | (1) |
|
2.3 Design Basis Threat (DBT) |
|
|
24 | (1) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
26 | (1) |
|
2.8 Adversarial Vulnerability Assessments |
|
|
26 | (2) |
|
|
28 | (6) |
|
|
28 | (1) |
|
|
29 | (2) |
|
3.3 Common security mistakes |
|
|
31 | (2) |
|
3.3 The VA report: Delivering the "bad news" |
|
|
33 | (1) |
|
4 Vulnerability myths and mistakes |
|
|
34 | (5) |
|
Part II Modeling and Simulation Tools for Critical Infrastructures |
|
|
|
3 Modeling and simulation of critical infrastructures |
|
|
39 | (18) |
|
|
39 | (1) |
|
2 Interdependency modeling |
|
|
40 | (2) |
|
|
42 | (3) |
|
4 Critical Infrastructures as Complex Systems |
|
|
45 | (3) |
|
|
45 | (2) |
|
|
47 | (1) |
|
|
48 | (4) |
|
5.1 Agent-based approaches |
|
|
50 | (1) |
|
5.2 Multilayer approaches |
|
|
51 | (1) |
|
|
52 | (5) |
|
4 Graphical formalisms for modelling critical infrastructures |
|
|
57 | (18) |
|
|
57 | (1) |
|
2 Requirements for CI modelling and simulation |
|
|
58 | (2) |
|
3 Graphical formalisms for CI modelling and simulation |
|
|
60 | (5) |
|
3.1 Graph-based techniques |
|
|
60 | (1) |
|
|
61 | (1) |
|
3.3 General simulation environments |
|
|
62 | (1) |
|
3.4 Agent-based modelling and simulation |
|
|
62 | (1) |
|
3.5 Discussion of requirements |
|
|
63 | (2) |
|
4 Practical experiences in modelling CIs: meeting the requirements with SAN |
|
|
65 | (5) |
|
4.1 CRUTIAL and HIDENETS: a brief introduction |
|
|
66 | (1) |
|
4.2 On the usage of SAN to match requirement R4 |
|
|
66 | (3) |
|
4.3 On the usage of SAN to match requirement R6 |
|
|
69 | (1) |
|
|
70 | (5) |
|
5 Semantic interoperability among federated simulators of critical infrastructures -- DIESIS project |
|
|
75 | (16) |
|
|
76 | (2) |
|
2 Related works and initiatives |
|
|
78 | (2) |
|
|
80 | (9) |
|
3.1 Managerial, legal and economic features |
|
|
80 | (1) |
|
|
81 | (8) |
|
|
89 | (2) |
|
6 Game theory in infrastructure security |
|
|
91 | (16) |
|
|
91 | (2) |
|
|
93 | (7) |
|
2.1 Simultaneous AD games |
|
|
93 | (1) |
|
|
94 | (2) |
|
|
96 | (1) |
|
|
97 | (1) |
|
2.5 Simultaneous DD games |
|
|
98 | (2) |
|
3 Limitations of game-theoretic models |
|
|
100 | (1) |
|
|
101 | (6) |
|
Part III Cybersecurity in Information and SCADA Systems |
|
|
|
7 Modelling, measuring and managing information technology risks |
|
|
107 | (18) |
|
|
107 | (1) |
|
2 What is risk with respect to information systems? |
|
|
108 | (2) |
|
|
108 | (1) |
|
|
109 | (1) |
|
3 Why is it important to manage risk? |
|
|
110 | (1) |
|
4 Managing risk at the organizational level |
|
|
110 | (1) |
|
|
111 | (6) |
|
5.1 Quantitative risk assessment |
|
|
112 | (1) |
|
5.2 Qualitative risk assessment |
|
|
112 | (5) |
|
|
117 | (4) |
|
6.1 Strategies for managing individual risks |
|
|
117 | (1) |
|
6.2 High-level risk management strategies |
|
|
118 | (1) |
|
6.3 Communicating risks and risk management strategies |
|
|
119 | (1) |
|
6.4 Implementing risk management strategies |
|
|
120 | (1) |
|
7 What are some common risk assessment/management methodologies and tools? |
|
|
121 | (1) |
|
|
121 | (1) |
|
|
122 | (1) |
|
|
122 | (1) |
|
|
122 | (1) |
|
|
122 | (3) |
|
8 Trustworthiness evaluation of critical information infrastructures |
|
|
125 | (16) |
|
|
125 | (1) |
|
2 Dependability and security evaluation approaches |
|
|
126 | (5) |
|
2.1 A taxonomy for evaluation approaches |
|
|
126 | (2) |
|
2.2 Common evaluation approaches and applications |
|
|
128 | (3) |
|
3 On the evaluation of Financial Infrastructure Protection (FIP) |
|
|
131 | (3) |
|
3.1 FCI: Trustworthiness evaluation trends |
|
|
131 | (1) |
|
3.2 FIP trustworthiness requirements and key components |
|
|
132 | (1) |
|
3.3 FIP example: CoMiFin as a FCI wrapper |
|
|
133 | (1) |
|
3.4 Metric-based FIP trustworthiness evaluation |
|
|
134 | (1) |
|
4 On the evaluation of CIIP |
|
|
134 | (4) |
|
4.1 Design requirements for CIIP |
|
|
135 | (1) |
|
4.2 Peer-to-Peer (P2P)-based CIIP |
|
|
136 | (1) |
|
4.3 Mitigation strategy for node crashes |
|
|
137 | (1) |
|
4.4 Mitigation strategy for illicit SCADA data modification |
|
|
137 | (1) |
|
4.5 Evaluation of P2P-based CIIP |
|
|
137 | (1) |
|
|
138 | (3) |
|
|
141 | (14) |
|
|
141 | (3) |
|
2 A component-based framework for improving network resilience in CIs |
|
|
144 | (2) |
|
3 Intrusion detection and reaction in satellite networks |
|
|
146 | (2) |
|
4 Detection and remediation of a distributed attack over an IP-based network |
|
|
148 | (1) |
|
5 Diagnosis-driven reconfiguration of WSNs |
|
|
149 | (3) |
|
|
152 | (3) |
|
10 Wireless sensor networks for critical infrastructure protection |
|
|
155 | (22) |
|
|
155 | (2) |
|
2 Security threat analysis |
|
|
157 | (2) |
|
|
157 | (1) |
|
|
158 | (1) |
|
3 Survey of the state of the art |
|
|
159 | (6) |
|
3.1 Sensor node protection |
|
|
160 | (1) |
|
3.2 Dependable sensor networking |
|
|
161 | (3) |
|
3.3 Dependable sensor network services |
|
|
164 | (1) |
|
4 Conclusions and identification of further research topics |
|
|
165 | (12) |
|
Part IV Monitoring and Surveillance Technologies |
|
|
|
11 Intelligent video surveillance |
|
|
177 | (14) |
|
|
177 | (2) |
|
2 Architecture of an IVS system |
|
|
179 | (2) |
|
3 Examples of applications |
|
|
181 | (6) |
|
|
181 | (1) |
|
|
182 | (4) |
|
|
186 | (1) |
|
|
187 | (4) |
|
|
191 | (16) |
|
|
191 | (2) |
|
2 Sound recognition for audio surveillance |
|
|
193 | (4) |
|
3 A representative picture of the related literature |
|
|
197 | (4) |
|
3.1 Evaluation of audio surveillance frameworks |
|
|
199 | (2) |
|
|
201 | (1) |
|
|
202 | (5) |
|
13 Terahertz for weapon and explosive detection |
|
|
207 | (14) |
|
|
207 | (1) |
|
|
208 | (3) |
|
|
208 | (1) |
|
|
209 | (2) |
|
3 Terahertz for weapons detection |
|
|
211 | (2) |
|
4 Terahertz for explosive detection |
|
|
213 | (3) |
|
|
216 | (5) |
|
14 Structural health monitoring |
|
|
221 | (12) |
|
|
221 | (1) |
|
|
222 | (1) |
|
|
223 | (5) |
|
|
224 | (1) |
|
|
224 | (1) |
|
|
224 | (1) |
|
|
224 | (1) |
|
|
225 | (1) |
|
3.6 Fiber Bragg Gratings (FBGs) |
|
|
226 | (1) |
|
3.7 Acoustic emission sensors |
|
|
227 | (1) |
|
3.8 Additional technologies |
|
|
227 | (1) |
|
4 System design and integration |
|
|
228 | (2) |
|
|
229 | (1) |
|
5 Review and interpretation of the data |
|
|
230 | (1) |
|
|
230 | (3) |
|
15 Networks of simple sensors for detecting emplacement of improvised explosive devices |
|
|
233 | (16) |
|
|
233 | (1) |
|
2 Clues to IED emplacement |
|
|
234 | (7) |
|
2.1 Cameras versus nonimaging sensors |
|
|
234 | (1) |
|
2.2 Prior probabilities for emplacement |
|
|
235 | (3) |
|
|
238 | (1) |
|
2.4 Goal changing and coordinated activity |
|
|
239 | (2) |
|
|
241 | (1) |
|
|
242 | (2) |
|
|
244 | (5) |
|
Part V Security Systems Integration and Alarm Management |
|
|
|
16 Security systems design and integration |
|
|
249 | (18) |
|
|
249 | (1) |
|
2 The intrusion detection system |
|
|
250 | (5) |
|
|
251 | (2) |
|
|
253 | (1) |
|
|
254 | (1) |
|
3 The access control system |
|
|
255 | (2) |
|
4 The video surveillance system |
|
|
257 | (3) |
|
5 The communication network |
|
|
260 | (3) |
|
6 Integration of security systems: The supervision and control system |
|
|
263 | (2) |
|
|
265 | (2) |
|
17 Multisource information fusion for critical infrastructure situation awareness |
|
|
267 | (12) |
|
|
267 | (1) |
|
2 Joint Directors of Laboratories (JDL) data fusion process model |
|
|
268 | (2) |
|
3 Comments on the state of the art |
|
|
270 | (1) |
|
4 Human-centric information fusion |
|
|
271 | (3) |
|
5 Implications for infrastructure situation awareness |
|
|
274 | (1) |
|
|
274 | (5) |
|
18 Simulation-based learning in the physical security industry |
|
|
279 | (14) |
|
|
279 | (1) |
|
|
279 | (1) |
|
|
280 | (1) |
|
4 Security simulation domains |
|
|
280 | (3) |
|
4.1 Computation simulators |
|
|
280 | (2) |
|
4.2 Interactive simulation |
|
|
282 | (1) |
|
5 Simulation in a training environment |
|
|
283 | (4) |
|
5.1 Systematic approach to training for simulation |
|
|
284 | (3) |
|
6 Interactive simulators and simulation learning theory |
|
|
287 | (2) |
|
|
288 | (1) |
|
7 Security simulation and vulnerability assessment |
|
|
289 | (1) |
|
8 Historical adoption curve of use of simulators |
|
|
289 | (2) |
|
|
291 | (2) |
|
19 Frameworks and tools for emergency response and crisis management |
|
|
293 | |
|
|
293 | (1) |
|
|
294 | (7) |
|
|
294 | (2) |
|
|
296 | (2) |
|
2.3 Consequence assessment |
|
|
298 | (3) |
|
3 Summary and conclusions |
|
|
301 | |