C2 Toimitettu kirja, kokoomateos, konferenssijulkaisu tai lehden erikoisnumero
Cyber Security : Critical Infrastructure Protection (2022)
Lehto, M., & Neittaanmäki, P. (Eds.). (2022). Cyber Security : Critical Infrastructure Protection. Springer. Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2
JYU-tekijät tai -toimittajat
Julkaisun tiedot
Julkaisun kaikki tekijät tai toimittajat: Lehto, Martti; Neittaanmäki, Pekka
ISBN: 978-3-030-91292-5
eISBN: 978-3-030-91293-2
Lehti tai sarja: Computational Methods in Applied Sciences
ISSN: 1871-3033
eISSN: 2543-0203
Julkaisuvuosi: 2022
Sarjan numero: 56
Kirjan kokonaissivumäärä: 484
Kustantaja: Springer
Kustannuspaikka: Cham
Julkaisumaa: Sveitsi
Julkaisun kieli: englanti
DOI: https://doi.org/10.1007/978-3-030-91293-2
Julkaisun avoin saatavuus: Ei avoin
Julkaisukanavan avoin saatavuus:
Tiivistelmä
The second part focus on the critical infrastructure protection in different areas of the critical infrastructure. The chapters cover the cybersecurity situation awareness, aviation and air traffic control, cyber security in smart societies and cities, cyber security in smart buildings, maritime cyber security, cyber security in energy systems, and cyber security in healthcare.
The third part presents the impact of new technologies upon cyber capability building as well as new challenges brought about by new technologies. These new technologies are among others are quantum technology, firmware and wireless technologies, malware analysis, virtualization.
YSO-asiasanat: kyberturvallisuus; infrastruktuurit; digitalisaatio; suojelu
Vapaat asiasanat: digital society; infrastructure; protection; cyber security; healthcare systems
Liittyvät organisaatiot
OKM-raportointi: Kyllä
Raportointivuosi: 2022
JUFO-taso: 1
Tähän julkaisuun sisältyvät artikkelit, joissa JYU:n tekijöitä:
- Lehto, M. (2022). Cyber-Attacks Against Critical Infrastructure. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 3-42). Springer. Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2_1
- Vähäkainu, P., Lehto, M., & Kariluoto, A. (2022). Cyberattacks Against Critical Infrastructure Facilities and Corresponding Countermeasures. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 255-292). Springer. Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2_11
- Lehto, M., Neittaanmäki, P., Pöyhönen, J., & Hummelholm, A. (2022). Cyber Security in Healthcare Systems. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 183-215). Springer . Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2_8
- Pöyhönen, J. (2022). Cyber Security of an Electric Power System in Critical Infrastructure. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 217-239). Springer International Publishing. Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2_9
- Hummelholm, A. (2022). Future Smart Societies’ Infrastructures and Services in the Cyber Environments. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 151-182). Springer. Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2_7
- Salmenpää, T. (2022). Information Security Governance in Civil Aviation. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 315-336). Springer. Computational Methods in Applied Sciences, 56. https://doi.org/ 10.1007/978-3-030-91293-2_13
- Costin, A. (2022). Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 419-443). Springer. Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2_18
- Zolotukhin, M., Hämäläinen, T., & Kotilainen, P. (2022). Intelligent Solutions for Attack Mitigation in Zero-Trust Environments. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 403-417). Springer. Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2_17
- Kiperberg, M., Resh, A., & Zaidenberg, N. (2022). Malware Analysis. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 475-484). Springer. Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2_21
- Rauhala, J. (2022). Physical Weaponization of a Smartphone by a Third Party. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 445-460). Springer. Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2_19