Zum Hauptinhalt springen Zur Suche springen Zur Hauptnavigation springen
Haben Sie Fragen? Einfach anrufen, wir helfen gerne: Tel. 089/210233-0
oder besuchen Sie unser Ladengeschäft in der Pacellistraße 5 (Maxburg) 80333 München
+++ Versandkostenfreie Lieferung innerhalb Deutschlands
Haben Sie Fragen? Tel. 089/210233-0

Cyber Risk Analysis of Industrial Control Systems

55,80 €*

Dieses Produkt erscheint am 4. September 2025

Produktnummer: 18abc7ce1bdf9d42efa4dfdda60fd48bc6
Autor: Mikhaylenko, Dina
Themengebiete: Cyber Risk Industrial Control Systems Stealthy cyber attack
Veröffentlichungsdatum: 04.09.2025
EAN: 9783819101250
Auflage: 1
Sprache: Englisch
Seitenzahl: 139
Produktart: Kartoniert / Broschiert
Verlag: Shaker
Produktinformationen "Cyber Risk Analysis of Industrial Control Systems"
Cyber-physical systems (CPS) represent an advanced integration of physical processes, computational resources, and communication capabilities. They are widely utilized in critical sectors such as mobility, healthcare, energy, and manufacturing. CPS depend on network communication, which creates potential vulnerabilities that can be exploited by attackers. This work examines the difficulties associated with the protection of CPS from cyber threats, with a particular emphasis on advanced forms of stealthy cyber attack, including replay, covert, and zero dynamics attacks. Additionally, it is shown that protecting only part of the signals can increase the security of the system. A security index and its application are introduced. It is argued that the mirror attack poses an even greater threat than replay or covert attacks. The use of tools such as the extended Kalman filter allows attackers to remain stealthy even when they have incomplete knowledge of the system model. Demonstrations on a three-tank system illustrate the significant risks associated with mirror attacks and highlight the urgent need for robust detection and resilient system designs. In order to address these challenges, an encryption scheme based on homomorphic encryption is used to secure remote monitoring. This encryption method secures not only the communication channels but also the monitoring logic, allowing computations be performed on encrypted data without exposing system parameters or signals. The effectiveness of this approach in enhancing security against cyber attacks while managing computational constraints has been demonstrated through simulations on a quadruple tank system.
Bücherregal gefüllt mit juristischen Werken

Sie möchten lieber vor Ort einkaufen?

Sie haben Fragen zu diesem oder anderen Produkten oder möchten einfach gerne analog im Laden stöbern? Wir sind gerne für Sie da und beraten Sie auch telefonisch.

Juristische Fachbuchhandlung
Georg Blendl

Parcellistraße 5 (Maxburg)
8033 München

Montag - Freitag: 8:15 -18 Uhr
Samstags geschlossen