Abstract
In the era of global communication and increasingly sophisticated technologies, cyber security is becoming a primary line of defense in the modern world (alongside with state security, nuclear security, biomedical sciences, etc.), aiming to virtually ensure safety and stability of humanity at the global level.
The cyberwarfare is neither a science fiction nor an emerging concept. We live in the world where covert operations are carried out across the world without the deployment of human operatives. Offensive cyber-security tools are accessible globally; many of them are free of charge.
Current manuscript offers an insight into the global field of cyber security under various angles, going beyond the security of personal computers, laptops, and smartphones. The Handbook on Security Sciences reviews selected issues in Computer and Network Security, Wireless Security, Cryptography, Critical Infrastructure Cyber Security, Confidence and Security Building Measures, Industrial Control Systems Security, and last but not least Physical Security.
The proposed guidelines can be used by academics, cyber-security experts, security managers, and general office staff to enhance the cyber security of their nation, organization, and personal lives.
Similar content being viewed by others
References
Abaimov S, Martellini M (2020) Cyber Arms. CRC Press, Security in Cyberspace
Bundesamt für Sicherheit in der Informationstechnik (2014) Die Lage der IT-Sicherheit in Deutschland 2014. Retrieved from Wired https://www.wired.com/wp-content/uploads/2015/01/Lagebericht2014.pdf
CIA (2007–2013) Terrorist CBRN: materials and effects. Retrieved from https://www.cia.gov/library/reports/general-reports-1/terrorist_cbrn/terrorist_CBRN.htm
Kaspersky Lab (2016) Threat landscape for industrial automation systems in the second half of 2016. Retrieved from Kaspersky Lab, ICS CERT. https://ics-cert.kaspersky.com/reports/2017/03/28/threat-landscape-for-industrial-automation-systems-in-the-second-half-of-2016/
Keizer G (2012) Iran confirms cyberattacks against oil facilities. Retrieved from COMPUTERWORLD http://www.computerworld.com/s/article/9226469/Iran_confirms_cyberattacks_against_oil_facilities
Khandelwal S (2017) WannaCry coding mistakes can help files recovery even after infection. Retrieved from The Hacker News http://thehackernews.com/2017/06/wannacry-ransomware-unlock-files.html
Liptak A (2018) Strava’s fitness tracker heat map reveals the location of military bases. Retrieved from The Verge https://www.theverge.com/2018/1/28/16942626/strava-fitness-tracker-heat-map-military-base-internet-of-things-geolocation
Martellini M (2018) Cyber attacks against seveso-like critical chemical facilities: a virtual critical chemical facility to simulate their vulnerabilities and for training. G7GPWG, Ottawa
Scott J (2017) Signature based malware detection is dead. Institute for Critical Infrastructure Technology
Shodan Search (2018) ICS. Retrieved from Shodan Search: https://www.shodan.io/search?query=ics
Symantec (2016) Internet security threat report, vol 21. Retrieved from Symantec https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf
United Nations (1999) United Nations official document, A/RES/53/70. Retrieved from http://www.un.org/ga/search/view_doc.asp?symbol=A/RES/53/70
United Nations (2013) United Nations official document, A/68/98. Retrieved from http://www.un.org/ga/search/view_doc.asp?symbol=A/68/98
WikiLeaks (2017) Vault 7: CIA hacking tools revealed. Retrieved from WikiLeaks https://wikileaks.org/ciav7p1/
Wilson C (2014) Cyberterrorism: understanding, assessment, and response. Swansea University, Springer, New York
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2022 Springer Nature Switzerland AG
About this entry
Cite this entry
Martellini, M., Abaimov, S. (2022). Physical Security, Cyber Security, and Critical Infrastructure: An Introduction. In: Masys, A.J. (eds) Handbook of Security Science. Springer, Cham. https://doi.org/10.1007/978-3-319-51761-2_58-3
Download citation
DOI: https://doi.org/10.1007/978-3-319-51761-2_58-3
Received:
Accepted:
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-51761-2
Online ISBN: 978-3-319-51761-2
eBook Packages: Springer Reference Physics and AstronomyReference Module Physical and Materials ScienceReference Module Chemistry, Materials and Physics
Publish with us
Chapter history
-
Latest
Physical Security, Cyber Security, and Critical Infrastructure: An Introduction- Published:
- 11 May 2022
DOI: https://doi.org/10.1007/978-3-319-51761-2_58-3
-
Physical Security, Cyber Security, and Critical Infrastructure: An Introduction
- Published:
- 28 January 2021
DOI: https://doi.org/10.1007/978-3-319-51761-2_58-2
-
Original
Physical Security, Cyber Security, and Critical Infrastructure: An Introduction- Published:
- 30 May 2018
DOI: https://doi.org/10.1007/978-3-319-51761-2_58-1