Information security of highly critical wireless networks /

Saved in:
Bibliographic Details
Author / Creator:Martellini, M. (Maurizio), author.
Imprint:Cham, Switzerland : Springer, 2017.
Description:1 online resource
Language:English
Series:SpringerBriefs in computer science, 2191-5768
SpringerBriefs in computer science.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11271690
Hidden Bibliographic Details
Other authors / contributors:Abaimov, Stanislav, author.
Gaycken, Sandro, 1973- author.
Wilson, Clay, author.
ISBN:9783319529059
3319529056
9783319529042
3319529048
Digital file characteristics:text file PDF
Notes:Includes bibliographical references.
Online resource; title from PDF title page (SpringerLink, viewed February 20, 2017).
Summary:This SpringerBrief explores features of digital protocol wireless communications systems, and features of the emerging electrical smart grid. Both low power and high power wireless systems are described. The work also examines the cybersecurity vulnerabilities, threats and current levels of risks to critical infrastructures that rely on digital wireless technologies. Specific topics include areas of application for high criticality wireless networks (HCWN), modeling risks and vulnerabilities, governance and management frameworks, systemic mitigation, reliable operation, assessing effectiveness and efficiency, resilience testing, and accountability of HCWN. Designed for researchers and professionals, this SpringerBrief provides essential information for avoiding malevolent uses of wireless networks. The content is also valuable for advanced-level students interested in security studies or wireless networks.
Other form:Print version: Information security of highly critical wireless networks. Cham, Switzerland : Springer, 2017 3319529048 9783319529042
Standard no.:10.1007/978-3-319-52905-9
Table of Contents:
  • 1 Introduction
  • 2 What Is Highly Critical Wireless Networking (HCWN)
  • 3 Applications for HCWN
  • 4 Vulnerabilities and Security Issues
  • 5 Modeling Threats and Risks
  • 6 Modeling Vulnerabilities
  • 7 Governance and Management Frameworks
  • 8 Security Technologies for Networked Devices
  • 9 Known Weaknesses with Security Controls
  • 10 Competent Reliable Operation of HCWN
  • 11 Assessing the Effectiveness and Efficiency of Security Approaches
  • 12 Examples in Brief
  • 13 Testing the Resilience of HCWN
  • 14 Future Attack Patterns
  • 15 Assessing Cyberattacks Against Wireless Networks of the Next Global Internet of Things Revolution
  • 16 Conclusion.