Book Image

Critical Infrastructure Security

By : Soledad Antelada Toledano
Book Image

Critical Infrastructure Security

By: Soledad Antelada Toledano

Overview of this book

Discover the core of cybersecurity through gripping real-world accounts of the most common assaults on critical infrastructure – the body of vital systems, networks, and assets so essential that their continued operation is required to ensure the security of a nation, its economy, and the public’s health and safety – with this guide to understanding cybersecurity principles. From an introduction to critical infrastructure and cybersecurity concepts to the most common types of attacks, this book takes you through the life cycle of a vulnerability and how to assess and manage it. You’ll study real-world cybersecurity breaches, each incident providing insights into the principles and practical lessons for cyber defenders striving to prevent future breaches. From DDoS to APTs, the book examines how each threat activates, operates, and succeeds. Additionally, you’ll analyze the risks posed by computational paradigms, such as the advancement of AI and quantum computing, to legacy infrastructure. By the end of this book, you’ll be able to identify key cybersecurity principles that can help mitigate evolving attacks to critical infrastructure.
Table of Contents (16 chapters)
1
Part 1: Introduction to Critical Infrastructure and Cybersecurity Concepts
5
Part 2: Dissecting Cyberattacks on CI
8
Part 3: Protecting Critical Infrastructure
12
Part 4: What’s Next

References

To learn more about the topics that were covered in this chapter, take a look at the following resources:

  • Farwell, J. P., & Rohozinski, R. (2011). Stuxnet and the future of cyber war. Survival, 53(1), 23-40.
  • Matrosov, A., Rodionov, E., Harley, D., & Malcho, J. (2010). Stuxnet under the microscope. ESET LLC (September 2010), 6.
  • Kushner, D. (2013). The real story of stuxnet. ieee Spectrum, 50(3), 48-53.
  • Karnouskos, S. (2011, November). Stuxnet worm impact on industrial cyber-physical system security. In IECON 2011-37th Annual Conference of the IEEE Industrial Electronics Society (pp. 4490-4494). IEEE.
  • Lindsay, J. R. (2013). Stuxnet and the limits of cyber warfare. Security Studies, 22(3), 365-404.
  • Langner, R. (2011). Stuxnet: Dissecting a cyberwarfare weapon. IEEE Security & Privacy, 9(3), 49-51.
  • Dudley, R., & Golden, D. (2021). The colonial pipeline ransomware hackers had a secret weapon: self-promoting cybersecurity firms....