C2 Edited work
Cyber Security : Critical Infrastructure Protection (2022)
Lehto, M., & Neittaanmäki, P. (Eds.). (2022). Cyber Security : Critical Infrastructure Protection. Springer. Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2
JYU authors or editors
Publication details
All authors or editors: Lehto, Martti; Neittaanmäki, Pekka
ISBN: 978-3-030-91292-5
eISBN: 978-3-030-91293-2
Journal or series: Computational Methods in Applied Sciences
ISSN: 1871-3033
eISSN: 2543-0203
Publication year: 2022
Number in series: 56
Number of pages in the book: 484
Publisher: Springer
Place of Publication: Cham
Publication country: Switzerland
Publication language: English
DOI: https://doi.org/10.1007/978-3-030-91293-2
Publication open access: Not open
Publication channel open access:
Abstract
The second part focus on the critical infrastructure protection in different areas of the critical infrastructure. The chapters cover the cybersecurity situation awareness, aviation and air traffic control, cyber security in smart societies and cities, cyber security in smart buildings, maritime cyber security, cyber security in energy systems, and cyber security in healthcare.
The third part presents the impact of new technologies upon cyber capability building as well as new challenges brought about by new technologies. These new technologies are among others are quantum technology, firmware and wireless technologies, malware analysis, virtualization.
Keywords: cyber security; infrastructures; digitalisation; protection (activity)
Free keywords: digital society; infrastructure; protection; cyber security; healthcare systems
Contributing organizations
Ministry reporting: Yes
VIRTA submission year: 2022
JUFO rating: 1
This publication includes articles with JYU authors:
- Lehto, M., Neittaanmäki, P., Pöyhönen, J., & Hummelholm, A. (2022). Cyber Security in Healthcare Systems. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 183-215). Springer . Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2_8
- Pöyhönen, J. (2022). Cyber Security of an Electric Power System in Critical Infrastructure. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 217-239). Springer International Publishing. Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2_9
- Lehto, M. (2022). Cyber-Attacks Against Critical Infrastructure. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 3-42). Springer. Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2_1
- Vähäkainu, P., Lehto, M., & Kariluoto, A. (2022). Cyberattacks Against Critical Infrastructure Facilities and Corresponding Countermeasures. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 255-292). Springer. Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2_11
- Hummelholm, A. (2022). Future Smart Societies’ Infrastructures and Services in the Cyber Environments. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 151-182). Springer. Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2_7
- Salmenpää, T. (2022). Information Security Governance in Civil Aviation. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 315-336). Springer. Computational Methods in Applied Sciences, 56. https://doi.org/ 10.1007/978-3-030-91293-2_13
- Costin, A. (2022). Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 419-443). Springer. Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2_18
- Zolotukhin, M., Hämäläinen, T., & Kotilainen, P. (2022). Intelligent Solutions for Attack Mitigation in Zero-Trust Environments. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 403-417). Springer. Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2_17
- Kiperberg, M., Resh, A., & Zaidenberg, N. (2022). Malware Analysis. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 475-484). Springer. Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2_21
- Rauhala, J. (2022). Physical Weaponization of a Smartphone by a Third Party. In M. Lehto, & P. Neittaanmäki (Eds.), Cyber Security : Critical Infrastructure Protection (pp. 445-460). Springer. Computational Methods in Applied Sciences, 56. https://doi.org/10.1007/978-3-030-91293-2_19