Skip to main content

2020 | OriginalPaper | Buchkapitel

2. Critical Infrastructures

verfasst von : Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu

Erschienen in: Cyber-Security in Critical Infrastructures

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter refines the introduction of security in critical infrastructures by going into deeper details about how threats and countermeasures differ and are specific for the physical domain, the cyber domain and intermediate areas. Gaining an understanding of these differences is crucial for the design of effective countermeasures against the diverse nature of today’s advanced persistent threats (APTs). As even local incidents may have far-reaching consequences beyond the logical or physical boundaries of a critical infrastructure, we devote parts of the chapter to a discussion and overview of simulation methods that help to model and estimate possible effects of security incidents across interwoven infrastructures. Such simulation models form an invaluable source of information and data for the subsequent construction of game-theoretic security models discussed in the rest of the book.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat BABS (2019) Katalog der gefährdungen. Katalog der Gefhrdungen, Katastrophen und Notlagen Schweiz. Technical report, Bundesamt für Bevölkerungsschutz (BABS) BABS (2019) Katalog der gefährdungen. Katalog der Gefhrdungen, Katastrophen und Notlagen Schweiz. Technical report, Bundesamt für Bevölkerungsschutz (BABS)
3.
Zurück zum Zitat Barrett C, Beckman R, Channakeshava K, Huang F, Kumar VA, Marathe A, Marathe MV, Pei G (2010) Cascading failures in multiple infrastructures: from transportation to communication network. In: 2010 5th international conference on critical infrastructure (CRIS). IEEE, pp 1–8. https://doi.org/10.1109/CRIS.2010.5617569 Barrett C, Beckman R, Channakeshava K, Huang F, Kumar VA, Marathe A, Marathe MV, Pei G (2010) Cascading failures in multiple infrastructures: from transportation to communication network. In: 2010 5th international conference on critical infrastructure (CRIS). IEEE, pp 1–8. https://​doi.​org/​10.​1109/​CRIS.​2010.​5617569
4.
Zurück zum Zitat Barton DC, Eidson ED, Schoenwald DA, Stamber KL, Reinert R (2000) Aspen-EE: an agent-based model of infrastructure interdependency. Technical report. SAND2000-2925, 774027, Sandia National Labs. https://doi.org/10.2172/774027 Barton DC, Eidson ED, Schoenwald DA, Stamber KL, Reinert R (2000) Aspen-EE: an agent-based model of infrastructure interdependency. Technical report. SAND2000-2925, 774027, Sandia National Labs. https://​doi.​org/​10.​2172/​774027
8.
Zurück zum Zitat Borshchev A, Filippov A (2004) From system dynamics and discrete event to practical agent based modeling: reasons, techniques, tools. In: The 22nd international conference of the system dynamics society Borshchev A, Filippov A (2004) From system dynamics and discrete event to practical agent based modeling: reasons, techniques, tools. In: The 22nd international conference of the system dynamics society
11.
Zurück zum Zitat Busby J, Gouglidis A, Rass S, Konig S (2016) Modelling security risk in critical utilities: the system at risk as a three player game and agent society. In: 2016 IEEE international conference on systems, man, and cybernetics (SMC). IEEE, Budapest, pp 001758–001763. http://10.1109/SMC.2016.7844492. http://ieeexplore.ieee.org/document/7844492/ Busby J, Gouglidis A, Rass S, Konig S (2016) Modelling security risk in critical utilities: the system at risk as a three player game and agent society. In: 2016 IEEE international conference on systems, man, and cybernetics (SMC). IEEE, Budapest, pp 001758–001763. http://​10.​1109/​SMC.​2016.​7844492.​ http://​ieeexplore.​ieee.​org/​document/​7844492/​
13.
Zurück zum Zitat Cardellini V, Casalicchio E, Tucci S (2006) Agent-based modeling of web systems in critical information infrastructures. In: International workshop on complex networks and infrastructure protection (CNIP 2006) Cardellini V, Casalicchio E, Tucci S (2006) Agent-based modeling of web systems in critical information infrastructures. In: International workshop on complex networks and infrastructure protection (CNIP 2006)
58.
Zurück zum Zitat König S, Rass S, Schauer S (2019) Cyber-attack impact estimation for a port. In: Jahn C, Kersten W, Ringle CM (eds) Digital transformation in maritime and city logistics: smart solutions for logistics. In: Proceedings of the hamburg international conference of logistics (HICL), vol 28. epubli GmbH, pp 164–183. https://doi.org/10.15480/882.2496. ISBN 978-3-7502-4949-3 König S, Rass S, Schauer S (2019) Cyber-attack impact estimation for a port. In: Jahn C, Kersten W, Ringle CM (eds) Digital transformation in maritime and city logistics: smart solutions for logistics. In: Proceedings of the hamburg international conference of logistics (HICL), vol 28. epubli GmbH, pp 164–183. https://​doi.​org/​10.​15480/​882.​2496. ISBN 978-3-7502-4949-3
62.
Zurück zum Zitat Leontief WW (1951) Input-output economics. Sci Am 185:15–21 Leontief WW (1951) Input-output economics. Sci Am 185:15–21
67.
Zurück zum Zitat North MJ (2000) Smart II: the spot market agent research tool version 2.0. Nat Res Environ Issues 8(11) North MJ (2000) Smart II: the spot market agent research tool version 2.0. Nat Res Environ Issues 8(11)
69.
Zurück zum Zitat Office of Homeland Security (2002) National strategy for homeland security. Technical report, Department of Homeland Security Office of Homeland Security (2002) National strategy for homeland security. Technical report, Department of Homeland Security
72.
Zurück zum Zitat Owusu A, Mohamed S, Anissimov Y (2010) Input-output impact risk propagation in critical infrastructure interdependency. In: International conference on computing in civil and building engineering (icccbe). Nottingham University Press Owusu A, Mohamed S, Anissimov Y (2010) Input-output impact risk propagation in critical infrastructure interdependency. In: International conference on computing in civil and building engineering (icccbe). Nottingham University Press
73.
Zurück zum Zitat Pita J, Jain M, Ordonez F, Portway C, Tambe M, Western C (2008) ARMOR security for Los Angeles international airport. In: Proceedings of the 23rd AAAI conference on artificial intelligence (2008), pp 1884–1885 Pita J, Jain M, Ordonez F, Portway C, Tambe M, Western C (2008) ARMOR security for Los Angeles international airport. In: Proceedings of the 23rd AAAI conference on artificial intelligence (2008), pp 1884–1885
80.
Zurück zum Zitat Rass S, König S (2012) Turning Quantum Cryptography against itself: how to avoid indirect eavesdropping in quantum networks by passive and active adversaries. Int J Adv Syst Meas 5(1 & 2):22–33 Rass S, König S (2012) Turning Quantum Cryptography against itself: how to avoid indirect eavesdropping in quantum networks by passive and active adversaries. Int J Adv Syst Meas 5(1 & 2):22–33
92.
Zurück zum Zitat William S (2018) Lessons learned review of the WannaCry Ransomware Cyber Attack. Report NHS, Feb 2018 William S (2018) Lessons learned review of the WannaCry Ransomware Cyber Attack. Report NHS, Feb 2018
96.
Zurück zum Zitat Shieh EA, An B, Yang R, Tambe M, Baldwin C, DiRenzo J, Maule B, Meyer G (2013) PROTECT: an application of computational game theory for the security of the ports of the United States. In: Proceedings of the 26th AAAI conference on artificial intelligence (AAAI’12), pp 2173–2179 Shieh EA, An B, Yang R, Tambe M, Baldwin C, DiRenzo J, Maule B, Meyer G (2013) PROTECT: an application of computational game theory for the security of the ports of the United States. In: Proceedings of the 26th AAAI conference on artificial intelligence (AAAI’12), pp 2173–2179
100.
Zurück zum Zitat UP KRITIS (2014) Public-private partnership for critical infrastructure protection – basis and goals. Technical report, Bundesamt für Sicherheit in der Informationstechnick (BSI) UP KRITIS (2014) Public-private partnership for critical infrastructure protection – basis and goals. Technical report, Bundesamt für Sicherheit in der Informationstechnick (BSI)
110.
Zurück zum Zitat Zhang X, Zhan C, Tse CK (2017) Modeling the dynamics of cascading failures in power systems. IEEE J Emerg Sel Top Circuits Syst 7(2):192–204 Zhang X, Zhan C, Tse CK (2017) Modeling the dynamics of cascading failures in power systems. IEEE J Emerg Sel Top Circuits Syst 7(2):192–204
111.
Zurück zum Zitat Zhu Q, Saad W, Han Z, Poor HV, Başalr T (2011) Eavesdropping and jamming in next-generation wireless networks: a game-theoretic approach. In: 2011-MILCOM 2011 military communications conference. IEEE, pp 119–124 Zhu Q, Saad W, Han Z, Poor HV, Başalr T (2011) Eavesdropping and jamming in next-generation wireless networks: a game-theoretic approach. In: 2011-MILCOM 2011 military communications conference. IEEE, pp 119–124
Metadaten
Titel
Critical Infrastructures
verfasst von
Stefan Rass
Stefan Schauer
Sandra König
Quanyan Zhu
Copyright-Jahr
2020
DOI
https://doi.org/10.1007/978-3-030-46908-5_2

Premium Partner