Overview of Critical Information Infrastructure Protection.-The Art of CIIP Strategy: Tacking Stock of Content and Processes.-Infrastructure Sectors and the Information Infrastructure.-Understanding Cyber Threats and Vulnerabilities. Modelling Approaches.-Anomaly Detection in Water Management Systems.-Security Aspects of SCADA and DCS Environments.-SCADA Protocol Vulnerabilities.-Protection of SCADA Communication Channels.-Cyber Vulnerability in Power Systems Operation and Control.-Sector-Specific Information Infrastructure Issues in the Oil, Gas, and Petrochemical Sector.-Telecommunications.-Financial Services Industry.-Transportation.
The Art of CIIP Strategy: Tacking Stock of Content and Processes.-Infrastructure Sectors and the Information Infrastructure.-Understanding Cyber Threats and Vulnerabilities. Modelling Approaches.-Anomaly Detection in Water Management Systems.-Security Aspects of SCADA and DCS Environments.-SCADA Protocol Vulnerabilities.-Protection of SCADA Communication Channels.-Cyber Vulnerability in Power Systems Operation and Control.-Sector-Specific Information Infrastructure Issues in the Oil, Gas, and Petrochemical Sector.-Telecommunications.-Financial Services Industry.-Transportation.