Security-Related Advanced Technologies in Critical Infrastructure Protection: Theoretical and Practical Approach

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book collects the latest research results on security-related advanced technologies. The chapters contain relevant and interesting topics from numerous research. Data science and artificial intelligence research nowadays one of the most important topics for the industry and the security sectors. The autonomy and counter-autonomy research topic are also very interesting. Autonomous cars have become a part of the common days, but their safe and secure application is not assured. The research results in this field want to support and assure safe and secure autonomous applications in our quotidian life. Also, the safe and secure robotics in the industries and the defence assure a high standard of living and the given research results in this area can use to increase it. The researchers work on it and publish the results that can be interesting for the other researchers and the innovators, but also the industrial part members. The researchers work on it and publish the results that can be interesting for the other researchers and the innovators, but also the industrial part members. Communication is a part of our life, but the communication systems mesh all around the world. Communication is the basis of modern life because without it life stop. One other interesting and very important research area is the material sciences. Virtual life cannot exist without hardware and materials. The new technical applications require new materials, that can suffice the mechanical and physical, chemical properties demand. Nowadays a common requirement of the materials the high strength and lightweight. Researchers want to serve the industrial requests and innovate new composite materials or increase the properties of the material through a new technological process. The authors publish the latest results of the security-related research area including the newest innovations and technologies which rise the interest of the defence and the modern industries even the interest of other researchers.

Author(s): Tünde Anna Kovács, Zoltán Nyikes, Igor Fürstner
Series: NATO Science for Peace and Security Series C: Environmental Security
Publisher: Springer
Year: 2022

Language: English
Pages: 468
City: Dodrecht

Foreword
Organization
Contents
Chapter 1: Critical Threat of Critical Infrastructures: The Human Factor
1.1 Introduction
1.2 Critical Infrastructures
1.2.1 Protection of Critical Infrastructures
1.3 The Human Factor
1.3.1 Addressing the Human Factor
1.3.2 Dealing with the Human Factor
1.3.3 Boredom and Stress
1.4 Summary
References
Chapter 2: Applications of Hopkinson Bar Technique for Capability Testing of High-Energy Absorption Materials
2.1 Introduction
2.2 SHPB Test Stand and Configurations of Test Samples
2.3 Dynamic Behavior of Energy-Absorbing Building Materials
2.4 Evaluation Indexes of Energy Absorption
2.5 Conclusion
References
Chapter 3: A Method for Approximating Circular Error Probable
3.1 Introduction
3.2 Methods for Deriving CEP
3.2.1 Stochastic Approximation
3.3 Approximation CEP by SA
3.3.1 The Ratio of Standard Deviations in CEP Estimation
3.4 Numerical Analysis
3.5 Summary
References
Chapter 4: Machine Learning Aspects of Internet Firewall Data
4.1 Introduction
4.2 Modeling Network Firewall Rules by Neural Network
4.3 NN Parameter Analysis
4.4 Classification Machine Learning Algorithms with Implementation in Firewall Data
4.5 Firewall Dataset Clustering
4.6 Conclusions
Appendices
Appendix A: Clustering - K-Means Algorithm
Appendix B: Clustering - EM Algorithm
Appendix C: Clustering - DBSCAN Algorithm
References
Chapter 5: The End of Encryption? - The Era of Quantum Computers
5.1 Introduction
5.2 Machine Based Identification
5.3 Understanding Passwords
5.4 Encryption
5.5 Quantum Computers
5.6 Quantum Apocalypse
5.7 Summary
References
Chapter 6: Can Blockchain Technology Be a Solution for Safety in No-Trust Environments?
6.1 Introduction
6.2 Safety in Traditional and Modern-Age Systems
6.3 The Blockchain
6.4 Consensus Mechanisms to Be Used
6.4.1 Proof of Work (PoW)
6.4.2 Proof of Capacity (PoC)
6.4.3 Proof of Stake (PoS)
6.4.4 Proof of Importance (PoI)
6.4.5 Delegated Proof of Stake (DPoS)
6.4.6 Proof of Burn (PoB)
6.4.7 Proof of Authority (PoA)
6.4.8 Proof of Elapsed Time (PoET)
6.4.9 Summary of Potential Disadvantages of Blockchains
6.5 Summary
References
Chapter 7: A Security Assessment of AI, Related to the Financial Institutions
7.1 Introduction
7.2 A High-Level Threat Analysis
7.2.1 Threat Actors and Their Capabilities
7.2.2 AI´s Known Weaknesses
7.2.3 Use and the Role of AI in Financial Institutions
7.3 AI and Cybersecurity
7.3.1 Audit Standards
7.3.2 Risk Data and Risk Scenarios
7.4 Conclusion
References
Chapter 8: Machine Learning Based Network Intrusion Detection System for Internet of Things Cybersecurity
8.1 Introduction
8.1.1 Related Work
8.1.2 Dataset
8.2 Methods
8.2.1 Feature Selection
8.2.2 Supervised Learning Models
8.3 Results
8.4 Conclusion
References
Chapter 9: Need for Cybersecurity Solutions in IoT Systems
9.1 About IoT Systems
9.2 IoT Security
9.3 Examples of Attacking IoT Systems
9.3.1 Simple Attack
9.3.2 Disable a Wifi Security Camera with Aireplay-ng
9.3.3 Crack WPA2 PSK Passwords Using Aircrack-ng Tool
9.4 Conclusion
References
Chapter 10: Information Security Challenges and Solutions in Smart Nations
10.1 Introduction
10.2 Methodology
10.3 Research
10.4 Results
10.4.1 Information Security Challenges in the Smart Nation
10.4.1.1 Threats to Networks
10.4.1.2 Threats to Clients
10.4.1.3 Threats to Users
10.4.2 Information Security Solutions in the Smart Nation
10.5 Conclusion
References
Chapter 11: GIS Aided Safety Assessment of the Urban Green Areas
11.1 Introduction
11.2 Material and Methods
11.2.1 Acoustic Tomography
11.3 Results and Discussions
References
Chapter 12: Digital Competence and Security Awareness from the Perspective of Sustainability
12.1 Introduction
12.2 The Importance of Digital Competency
12.3 The Relationship Between Security Awareness and Digital Competencies
12.3.1 The Significance of Improving Digital Competencies and Security Awareness
12.4 Effects of the Pandemic to Users
12.4.1 The Challenges Posed by the Pandemic for the Home Office
12.5 The Responsibility of Infocommunication Network Service Providers and Competent Authorities
12.5.1 Potential Implementation Methods
12.5.2 Cyber-Border Protection
12.5.3 Establishing Internal Cyber Security of a Country
12.5.4 ICT Services as Critical Infrastructure
12.6 Conclusion
References
Chapter 13: Vibration Analysis and Characterization of Damaged Structural Glass Elements
13.1 Introduction
13.2 Vibration Analysis of Structural Glass Elements
13.2.1 Regulations and Calculation Methods
13.2.2 Calculation Examples
13.3 Post-breakage Vibration Analysis
13.3.1 Case-Study System
13.3.2 Test Setup, Instruments, Experimental Data
13.3.3 Experimental Results
13.4 Future Developments
References
Chapter 14: The Effects of Electromagnetic Waves on Human Health
14.1 Introduction
14.2 Materials and Experiments
14.3 Results and Discussions
14.4 Conclusions
References
Chapter 15: Material Testing Under Dynamic Loadings - Proper Design of Critical Infrastructure Structural Elements
15.1 Introduction
15.2 Experimental Set-Up
15.3 Numerical Modelling and Material Definition
15.3.1 FE Model
15.3.2 Constitutive Equation
15.3.3 Failure Criterion and Failure Mechanism for Metals
15.4 Comparison of Experimental and Numerical Results
15.5 Conclusions
References
Chapter 16: Collaborative Robots in the Critical Infrastructure Area Review
16.1 Introduction
16.2 From Industrial Robotics to Cobotics
16.3 Manifestations of Cooperation Between Humans and Robots
16.3.1 Direct Modality
16.3.2 Indirect Mode (Remote)
16.4 Cobots Controlling
16.5 Conclusion
References
Chapter 17: Challenges for the Energy Sector in the Light of Climate Change
17.1 Introduction
17.2 The Impact of the Climate Change on the Energy Production
17.3 The Vulnerability of Energy Production Built on Non-conventional Power Sources
17.4 Conclusion
References
Chapter 18: Fuzzy-Based Intrusion Detection Systems
18.1 Introduction
18.2 Intrusion Detection System
18.2.1 General IDS Architecture
18.3 Application of Artificial Intelligence in Intrusion Detection
18.3.1 Fuzzy Intrusion Detection Systems
18.3.2 Fuzzy Logic
18.3.3 Application of Fuzzy Logic in Intrusion Detection Systems
18.4 Conclusion
References
Chapter 19: UAV Route Planning in Urban and Suburban Surveillance Scenarios
19.1 Introduction
19.2 UAVs and Road and Traffic Monitoring
19.2.1 Road and Traffic Monitoring
19.2.2 Applications of UAVs in Road Monitoring
19.3 Methodology
19.4 Results
19.5 Conclusion
References
Chapter 20: Automated Guided Vehicles Safety Issues and Security Aspects
20.1 Introduction
20.2 AGV Safety Standards
20.3 The Main Parts of an AGV
20.4 The Main AGV Safety Elements
20.5 Collisions in a Storage Environment
20.6 The AGVs Navigation
20.7 3D Printed AGVs as an Experimental Setup
20.8 Conclusion
References
Chapter 21: Interconnected Drone Systems for Monitoring Regional Safety Issues in Field Agriculture
21.1 Introduction
21.2 Precision Agriculture
21.2.1 Remote Sensing, Passive vs. Active Data Collection
21.2.2 The Electromagnetic Spectrum
21.3 Aerial Units
21.3.1 Satellite Crop Monitoring
21.3.2 UAV Remote Sensing
21.4 Infrastructural Impact
21.5 Covered Areas with Drones
21.6 Conclusion
References
Chapter 22: Noise Level Assessment in an Urban Agglomeration
22.1 Introduction
22.2 Results And Discussion
22.2.1 Noise Measurements
22.3 Analysis of Measurements
22.4 Proposed Measures to Reduce Noise Levels
22.5 Conclusions
References
Chapter 23: Model of Resilience Assessment of Electricity Infrastructure
23.1 Introduction
23.2 State of Art
23.3 Methods
23.4 Results - Model of Resilience Assessment of Electricity Infrastructure
23.5 Discussion and Conclusion
References
Chapter 24: Li-Ion Batteries - An Important Component in Critical Infrastructure Protection
24.1 Introduction
24.2 Experiments
24.3 Conclusions
References
Chapter 25: Hackathon Based Learning in Education of Software Engineers
25.1 Introduction
25.1.1 Hackathon
25.1.2 Key Competences
25.2 Subotica Tech and Project Based Learning
25.2.1 Students at Hackathons
25.3 Hackathon Based Learning
25.3.1 Security
25.3.2 Types of Security Attacks
25.3.3 Web Programming and Database 2 Hackathon
25.3.4 Internet Technologies Hackathon
25.3.5 Hackathon Improvements
25.4 Future Plans
25.5 Conclusion
References
Chapter 26: Critical Infrastructure Protection in the Production and Use of Explosives Industry Products
26.1 Urgency of the Topic
26.2 Conditions for the Manufacture of Explosives
26.3 Occupational Safety Features of the Establishment of an Explosives Manufacturing Plant
26.4 Occupational Safety in the Manufacture of Explosives and Explosive Bodies
26.4.1 Pressing of Explosives
26.4.2 Casting of Explosives
26.4.3 Grinding of Explosives
26.4.4 Plasticization of Explosives
References
Chapter 27: Tasks of the Implementation of Physical Security System of the CBRN Laboratories
27.1 Introduction
27.2 Risk Analysis and the Establishment of the Defence Concept
27.3 The Components of the Physical Security System
27.3.1 Mechanical Defense
27.3.2 Electronical Defense
27.3.2.1 Intrusion Detection System
Exterior Intrusion Detection Application
27.3.2.2 Access Control System
27.3.2.3 CCTV System and EAS
27.3.3 Security Personnel and Preventive Measures
27.4 Conclusion
References
Chapter 28: Industry 4.0 and Rami Model Based Art in Microindustry for Polishing Application
28.1 Introduction
28.2 The Reference Architectural Model Industry - RAMI 4.0
28.3 Model of the Industry
28.3.1 The Current Technological System of the Polishing Process
28.3.2 Algorithm of the New Solution
28.3.3 Components of the New System
28.4 The New Industry 4.0 Solution - Polishing Robotic Arm
28.5 Conclusion
References
Chapter 29: Principles of Physical Protection of Strategic Assets Against Blast Effects
29.1 Introduction
29.1.1 Strategic Assets
29.2 Principle of Protection - Security Measures for Blast Protection
29.2.1 Threats on the Assets
29.2.2 Site Security Design
29.2.3 Assessment of the Resilience of the Protected Asset
29.2.4 Security Measures
29.2.5 Increasing of Stand - Off Distance - Perimeter Protection
29.2.6 Increasing of Assets Blast Resistance Using Retrofit Technique - Structural Protection
29.3 Conclusions
References
Chapter 30: The Impact of Cloud Systems on Manufacturing
30.1 Introduction
30.2 Theoretical Analysis of the System
30.3 Presentation of the System
30.4 Conclusion
References
Chapter 31: Robots in the Industry 4.0
31.1 Introduction
31.2 The Collaborative Robots
31.3 Collaborative Welder Robots
31.4 What Is Cobot?
31.5 Cobot as an Enabler of Lean Automation in Assembly Cells
31.6 Selection of Cobot
31.7 The Workspace
31.8 Conclusion
References
Chapter 32: Analysis of New Types of Security Challenges Affecting Catholic Christian Sacred Sites to Identify Those as Critic...
32.1 Introduction
32.2 Determination of the Term Christian Sacred Sites
32.3 Christian Sacred Sites as Critical Infrastructures
32.4 Assessment of the Security Risk Measure
32.5 Conclusions
References
Chapter 33: Can Trust Be a Factor of Organisational Safety and Security?
33.1 Introduction
33.2 Organisational Safety and Security from a Systemic Perspective
33.3 Decisions as the Foundations of a Secure and Organisational System
33.4 How to Increase Organisational Safety and Security with Decisions
33.5 Security-Conscious Culture Theory - Institutionalizing Trust
33.6 Summary
References
Chapter 34: Identification and Authentication Potentials Based on Limited Biometric Data
34.1 Introduction - Identification vs. Authentication
34.2 The Most Frequent Biometric Identification and Authentication Procedures
34.3 The Vulnerability of Biometric Data
34.4 Criteria to Determine Applicable Biometric Methods
34.5 Conclusion
References
Chapter 35: Language as a Medium of Security
35.1 Introduction
35.2 The Dictionary Rules
35.3 Origin of the Term `Security´
35.4 Various Meanings of the Term `Security´
35.4.1 Quality or State of Being Secure
35.4.2 Freedom of Danger
35.4.3 Freedom from Fear or Anxiety
35.4.4 Freedom from the Prospect of Being Laid Off: Job Security
35.4.5 Security Is Something Deposited or Pledged to Make Certain the Fulfillment of an Obligation
35.4.6 Something that Secures: Protection
35.4.7 Measures Taken to Guard Against Espionage or Sabotage, Crime, Attack, or Escape
35.5 Direct Influence of Language on Security: An Example from Irish History
35.5.1 `Plenipotentiary´
35.5.2 `Decommissioning´
35.6 Conclusion
References
Chapter 36: Use of Airbridges in Support of Encircled Forces and the Role of Airfields
36.1 Introduction
36.2 The Airbridge According to NATO Doctrines
36.2.1 Tactical Airbridges in Support of Encircled Forces (1942-1945)
36.2.2 Demyansk Airbridge, February-April 1942
36.2.3 Holm Airbridge, January-May 1942
36.2.4 Stalingrad Airbridge, November 1942-February 1943
36.2.5 Korsun - Shevchenkovsky (Cherkassy) Airbridge, January-February 1944
36.2.6 Chernivtsi Airbridge, March 1944
36.2.7 Tarnopol Airbridge, March-April 1944
36.2.8 Kovel Airbridge, March-April 1944
36.2.9 Budapest Airbridge, December 1944-February 1945
36.2.10 Breslau Air Bridge, February 1945
36.3 Summary
36.4 Conclusions
References
Chapter 37: The Purpose of Internet Use Among Pupils During the Covid-19 Pandemic
37.1 Introduction
37.2 Theoretical Consideration
37.3 Reseacrh Methodology
37.3.1 Subject and Problem of Research
37.3.2 Test and Data Processing Methods
37.3.3 Data on the Procedure and Sample of the Research
37.4 Reseacrh Results and Disussion
37.5 Conclusion
References
Chapter 38: Family Patterns´ Role in IT Security Aware Behavior
38.1 Introduction
38.2 Conceptual Framework
38.3 Methods
38.3.1 Data Collection and Analyses
38.4 Results
38.4.1 Demographic Characteristics
38.4.2 Use of IT Tools and IT Security Awareness
38.4.3 Family Patterns in IT Security Awareness
38.5 Conclusions
References
Chapter 39: Advanced Tools for the Explosive Materials Identification
39.1 Introduction
39.2 Asymmetric Warfare
39.3 Homemade, Improvised Explosive Devices
39.3.1 Explosive Charge
39.3.2 Detonator and Trigger Mechanism
39.3.3 Power Source
39.3.4 Impact Coating
39.3.5 Camouflage Materials
39.3.6 Safety Device
39.4 Targeting of Explosive Devices
39.5 Bomb Woman - Breast Implant as an Explosive Device
39.5.1 Breast Implants
References