dc.contributor.author | Costin, Andrei | |
dc.contributor.editor | Lehto, Martti | |
dc.contributor.editor | Neittaanmäki, Pekka | |
dc.date.accessioned | 2023-01-25T08:28:43Z | |
dc.date.available | 2023-01-25T08:28:43Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | Costin, A. (2022). Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems. In M. Lehto, & P. Neittaanmäki (Eds.), <i>Cyber Security : Critical Infrastructure Protection</i> (pp. 419-443). Springer. Computational Methods in Applied Sciences, 56. <a href="https://doi.org/10.1007/978-3-030-91293-2_18" target="_blank">https://doi.org/10.1007/978-3-030-91293-2_18</a> | |
dc.identifier.other | CONVID_117601511 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/85169 | |
dc.description.abstract | In this chapter, we analyze cybersecurity weaknesses in three use-cases of real-world cyber-physical systems: transportation (aviation), remote explosives and robotic weapons (fireworks pyrotechnics), and physical security (CCTV). The digitalization, interconnection, and IoT-nature of cyber-physical systems make them attractive targets. It is crucial to ensure that such systems are protected from cyber attacks, and therefore it is equally important to study and understand their major weaknesses. | en |
dc.format.extent | 484 | |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Springer | |
dc.relation.ispartof | Cyber Security : Critical Infrastructure Protection | |
dc.relation.ispartofseries | Computational Methods in Applied Sciences | |
dc.rights | In Copyright | |
dc.subject.other | cybersecurity | |
dc.subject.other | firmware | |
dc.subject.other | binare | |
dc.subject.other | vulnerabilities | |
dc.subject.other | exploits | |
dc.subject.other | reverse engineering | |
dc.subject.other | protocols | |
dc.subject.other | cyber-physical systems | |
dc.subject.other | critical infrastructure | |
dc.subject.other | aviation | |
dc.subject.other | ADS-B | |
dc.subject.other | video surveillance | |
dc.subject.other | CCTV | |
dc.subject.other | remote firing systems | |
dc.subject.other | wireless pyrotechnics | |
dc.subject.other | RF | |
dc.subject.other | Zigbee | |
dc.title | Insecure Firmware and Wireless Technologies as “Achilles’ Heel” in Cybersecurity of Cyber-Physical Systems | |
dc.type | bookPart | |
dc.identifier.urn | URN:NBN:fi:jyu-202301251462 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tekniikka | fi |
dc.contributor.oppiaine | Secure Communications Engineering and Signal Processing | fi |
dc.contributor.oppiaine | Engineering | en |
dc.contributor.oppiaine | Secure Communications Engineering and Signal Processing | en |
dc.type.uri | http://purl.org/eprint/type/BookItem | |
dc.relation.isbn | 978-3-030-91292-5 | |
dc.type.coar | http://purl.org/coar/resource_type/c_3248 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 419-443 | |
dc.relation.issn | 1871-3033 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG | |
dc.rights.accesslevel | openAccess | fi |
dc.subject.yso | esineiden internet | |
dc.subject.yso | protokollat (tietoliikenne) | |
dc.subject.yso | takaisinmallinnus | |
dc.subject.yso | asejärjestelmät | |
dc.subject.yso | infrastruktuurit | |
dc.subject.yso | valvontajärjestelmät | |
dc.subject.yso | ilmailu | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | sulautettu tietotekniikka | |
dc.subject.yso | haavoittuvuus | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27206 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p9894 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p28853 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p15948 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p17539 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p13003 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3279 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5461 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p25011 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.relation.doi | 10.1007/978-3-030-91293-2_18 | |
dc.type.okm | A3 | |