|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
SCIDIR_on1009042477 |
003 |
OCoLC |
005 |
20231120010228.0 |
006 |
m o d |
007 |
cr cnu|||unuuu |
008 |
171103s2018 ne a ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d N$T
|d OPELS
|d YDX
|d IDEBK
|d EBLCP
|d OCLCF
|d OCLCA
|d UPM
|d MERER
|d SNK
|d OCLCQ
|d WAU
|d U3W
|d EZ9
|d OCLCQ
|d OCLCO
|d LQU
|d OCLCQ
|d S2H
|d LVT
|d OCLCQ
|d VT2
|d OCLCQ
|d OCLCO
|d K6U
|d OCLCQ
|d SFB
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1010506265
|a 1011125717
|a 1105173343
|a 1105560448
|a 1162229573
|a 1229520041
|a 1253413171
|a 1259586744
|
020 |
|
|
|a 9780128118191
|q (electronic bk.)
|
020 |
|
|
|a 0128118199
|q (electronic bk.)
|
020 |
|
|
|z 9780128118184
|
020 |
|
|
|z 0128118180
|
035 |
|
|
|a (OCoLC)1009042477
|z (OCoLC)1010506265
|z (OCoLC)1011125717
|z (OCoLC)1105173343
|z (OCoLC)1105560448
|z (OCoLC)1162229573
|z (OCoLC)1229520041
|z (OCoLC)1253413171
|z (OCoLC)1259586744
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 000000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Polemi, Nineta,
|e author.
|
245 |
1 |
0 |
|a Port cybersecurity :
|b securing critical information infrastructures and supply chains /
|c Nineta Polemi.
|
264 |
|
1 |
|a Amsterdam, Netherlands :
|b Elsevier,
|c [2018]
|
300 |
|
|
|a 1 online resource (xix, 193 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Online resource; title from PDF title page (ScienceDirect, viewed February 23, 2018).
|
520 |
|
|
|a Port Cybersecurity: Securing Critical Information Infrastructures and Supply Chains examines a paradigm shift in the way ports assess cyber risks and vulnerabilities, as well as relevant risk management methodologies, by focusing on initiatives and efforts that attempt to deal with the risks and vulnerabilities of port Critical Information Infrastructures (CII) ecosystems. Modern commercial shipping ports are highly dependent on the operation of complex, dynamic ICT systems and ICT-based maritime supply chains, making these central points in the maritime supply chain vulnerable to cybersecurity threats. Identifies barriers and gaps in existing port and supply chain security standards, policies, legislation and regulatory frameworksIdentifies port threat scenarios and analyzes cascading effects in their supply chainsAnalyzes risk assessment methodologies and tools, identifying their open problems when applied to a port's CIIs.
|
505 |
0 |
|
|a CONTENTS; LIST OF FIGURES; LIST OF TABLES; ACKNOWLEDGMENTS; GENERAL SECURITY GLOSSARY; MARITIME GLOSSARY; EXECUTIVE SUMMARY; 1 -- Introduction; 2 -- Ports' Critical Infrastructures; MARITIME ENVIRONMENT: THE ROLE OF COMMERCIAL PORTS; LAYERS OF THE PORTS' ICT SYSTEM; SECURITY AND SAFETY: TWO INTERRELATED CONCEPTS; MARITIME SECURITY ORGANIZATIONS; SECURITY OF PORT SERVICES; Attack Scenario I: Remote Access; Attack Scenario II: SCADA Attack.
|
505 |
8 |
|
|a 3 -- Security of Ports' Critical Information Infrastructures; SAFETY MANAGEMENT: A RESTRICTING APPROACH; CYBERSECURITY REGULATIONS AND STANDARDS; SECURITY MANAGEMENT: A HOLISTIC APPROACH; CIIP METHODOLOGIES; CYSM RISK ASSESSMENT TOOL AS A BEST PRACTICE; CYSM System Components; Showcase Scenario; Customization Phase; Risk Assessment Initiation Phase; Evaluation Phase; Risk Assessment Results Calculation and Review Phase; Security Policy Reporting Phase; CYSM Architecture.
|
505 |
8 |
|
|a 4 -- Maritime Supply Chain Risk Assessment (at Entity Level); SUPPLY CHAIN GRAPH MODELS; Supply Chain Service Graph; Security Declaration Statements; Security Requirements, Vulnerabilities, and Controls; Supply Chain Threat Scenarios; Security Controls to Threat Scenarios; Risk-Related Scales; MEDUSA: A MARITIME SCS RISK ASSESSMENT METHODOLOGY; Threat Assessment; Vulnerability Assessment; Likelihood Assessment; Partial and Overall SC Risk Assessment Evaluation; THE MEDUSA SCS RISK ASSESSMENT SYSTEM Test Scenario: The "Vehicles' Transport" Supply Chain Service; VALIDATION SCENARIOS; Validation Scenario 1: Implementation of Different Combinations of Security Controls; Validation Scenario 2: Variation of the Expected Consequences; Validation Scenario 3: Variation of the Probability of Occurrence of Threat Scenarios; Validation Scenario 4: Cascading Dependency Risks Validation.
|
505 |
8 |
|
|a 5 -- Maritime Supply Chain Risk Assessment (at Asset Level); STANDARDS AND METHODS; MITIGATE RISK ASSESSMENT SCS METHODOLOGY AT ASSET LEVEL; General Structure of the Methodology; 6 -- Conclusions and the Way Forward; BIBLIOGRAPHY; APPENDIX A -- CYSM QUESTIONNAIRE FOR PORTS' SECURITY AWARENESS; APPENDIX B -- THREAT ANALYSIS: AN EXAMPLE; APPENDIX C -- SUPPLY CHAIN CONTROLS AND VULNERABILITIES; INDEX.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Security systems.
|
650 |
|
0 |
|a Ports (Electronic computer system)
|
650 |
|
2 |
|a Computer Security
|0 (DNLM)D016494
|
650 |
|
6 |
|a S�ecurit�e informatique.
|0 (CaQQLa)201-0061152
|
650 |
|
6 |
|a Syst�emes de s�ecurit�e.
|0 (CaQQLa)201-0001035
|
650 |
|
6 |
|a Ports (Informatique)
|0 (CaQQLa)201-0360760
|
650 |
|
7 |
|a security systems.
|2 aat
|0 (CStmoGRI)aat300076660
|
650 |
|
7 |
|a COMPUTER SCIENCE
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Ports (Electronic computer system)
|2 fast
|0 (OCoLC)fst01072393
|
650 |
|
7 |
|a Security systems
|2 fast
|0 (OCoLC)fst01110883
|
776 |
0 |
8 |
|i Print version:
|a Polemi, Nineta.
|t Port cybersecurity.
|d Amsterdam, Netherlands : Elsevier, [2017]
|z 9780128118184
|w (OCoLC)1011087676
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9780128118184
|z Texto completo
|