dc.contributor.author | Lehto, Martti | |
dc.contributor.editor | Lehto, Martti | |
dc.contributor.editor | Neittaanmäki, Pekka | |
dc.date.accessioned | 2023-02-02T12:32:15Z | |
dc.date.available | 2023-02-02T12:32:15Z | |
dc.date.issued | 2022 | |
dc.identifier.citation | Lehto, M. (2022). Cyber-Attacks Against Critical Infrastructure. In M. Lehto, & P. Neittaanmäki (Eds.), <i>Cyber Security : Critical Infrastructure Protection</i> (pp. 3-42). Springer. Computational Methods in Applied Sciences, 56. <a href="https://doi.org/10.1007/978-3-030-91293-2_1" target="_blank">https://doi.org/10.1007/978-3-030-91293-2_1</a> | |
dc.identifier.other | CONVID_117611414 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/85317 | |
dc.description.abstract | In the cyber world, the most important threat focuses on critical infrastructure (CI). CI encompasses the structures and functions that are vital to society’s uninterrupted functioning. It comprises physical facilities and structures as well as electronic functions and services. Critical infrastructure systems comprise a heterogeneous mixture of dynamic, interactive, and non-linear elements. In recent years, attacks against critical infrastructures, critical information infrastructures and the Internet have become ever more frequent, complex and targeted because perpetrators have become more professional. Attackers can inflict damage or disrupt on physical infrastructure by infiltrating the digital systems that control physical processes, damaging specialized equipment and disrupting vital services without a physical attack. Those threats continue to evolve in complexity and sophistication. | en |
dc.format.extent | 484 | |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Springer | |
dc.relation.ispartof | Cyber Security : Critical Infrastructure Protection | |
dc.relation.ispartofseries | Computational Methods in Applied Sciences | |
dc.rights | In Copyright | |
dc.subject.other | critical infrastructure | |
dc.subject.other | cyber security | |
dc.subject.other | systems of systems | |
dc.title | Cyber-Attacks Against Critical Infrastructure | |
dc.type | bookPart | |
dc.identifier.urn | URN:NBN:fi:jyu-202302021599 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietojärjestelmätiede | fi |
dc.contributor.oppiaine | Information Systems Science | en |
dc.type.uri | http://purl.org/eprint/type/BookItem | |
dc.relation.isbn | 978-3-030-91292-5 | |
dc.type.coar | http://purl.org/coar/resource_type/c_3248 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 3-42 | |
dc.relation.issn | 1871-3033 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG | |
dc.rights.accesslevel | openAccess | fi |
dc.subject.yso | järjestelmät | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | verkkohyökkäykset | |
dc.subject.yso | infrastruktuurit | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3358 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27466 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p17539 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.relation.doi | 10.1007/978-3-030-91293-2_1 | |
dc.type.okm | A3 | |