Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures
by
Sklavos, Nicolas
, Tsantikidou, Kyriaki
in
Book publishing
/ Critical infrastructure
/ Critical Infrastructures
/ Cryptography
/ Cybersecurity
/ Cyberterrorism
/ Data security
/ Designers
/ Health care facilities
/ Industry 4.0
/ Infrastructure
/ Infrastructure (Economics)
/ Internet
/ Internet of Things
/ mitigation
/ Public health
/ Safety and security measures
/ smart health
/ Threats
/ threats and attacks
/ Transportation systems
2024
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures
by
Sklavos, Nicolas
, Tsantikidou, Kyriaki
in
Book publishing
/ Critical infrastructure
/ Critical Infrastructures
/ Cryptography
/ Cybersecurity
/ Cyberterrorism
/ Data security
/ Designers
/ Health care facilities
/ Industry 4.0
/ Infrastructure
/ Infrastructure (Economics)
/ Internet
/ Internet of Things
/ mitigation
/ Public health
/ Safety and security measures
/ smart health
/ Threats
/ threats and attacks
/ Transportation systems
2024
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures
by
Sklavos, Nicolas
, Tsantikidou, Kyriaki
in
Book publishing
/ Critical infrastructure
/ Critical Infrastructures
/ Cryptography
/ Cybersecurity
/ Cyberterrorism
/ Data security
/ Designers
/ Health care facilities
/ Industry 4.0
/ Infrastructure
/ Infrastructure (Economics)
/ Internet
/ Internet of Things
/ mitigation
/ Public health
/ Safety and security measures
/ smart health
/ Threats
/ threats and attacks
/ Transportation systems
2024
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures
Journal Article
Threats, Attacks, and Cryptography Frameworks of Cybersecurity in Critical Infrastructures
2024
Request Book From Autostore
and Choose the Collection Method
Overview
Critical Infrastructures (CIs), such as healthcare facilities, power grids, transportation systems, and financial institutions, are vital components of a functioning society, with the economy and safety being dependent on them. Nevertheless, they have become increasingly vulnerable to cyber threats and attacks in recent years. The main reason is their inability to quickly adapt to technological changes, employ updated cryptographic frameworks, and implement a thoroughly secure architecture based on their characteristics. In this study, the unique complexities of these systems are highlighted. Various verified cyberattacks that were executed against CIs in recent years are analyzed. Moreover, the general framework of CIs is demonstrated together with the employed technologies and cryptographic primitives. A thorough architecture of said technologies is developed to better understand the targeted components and easily identify potentially hidden threats. Afterwards, threat, adversary, and attack models that target critical systems and services are designed. The purpose is a better comprehension of the systems’ vulnerabilities, attack structures, motives, and targets for assisting CIs’ designers in creating secure frameworks and mechanisms, with the ability to mitigate such threats. Lastly, security controls and cryptography frameworks are demonstrated together with efficient mitigation architectures and implementations from the research community.
Publisher
MDPI AG
Subject
This website uses cookies to ensure you get the best experience on our website.