Custom cover image
Custom cover image

Security Management for Industrial Safety Critical Applications : A Practical Approach / by Raj Kamal Kaur, Lalit Kumar Singh, Pooja Singh, Ajit K. Verma

By: Contributor(s): Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Series: Asset Analytics, Performance and Safety ManagementPublisher: Singapore : Springer Nature Singapore, 2024Publisher: Singapore : Imprint: Springer, 2024Description: 1 Online-Ressource (XXVI, 211 p. 90 illus., 40 illus. in color.)ISBN:
  • 9789819740185
Subject(s): Additional physical formats: 9789819740178 | 9789819740192 | 9789819740208 | Erscheint auch als: 9789819740178 Druck-Ausgabe | Erscheint auch als: 9789819740192 Druck-Ausgabe | Erscheint auch als: 9789819740208 Druck-AusgabeDDC classification:
  • 658.5 23
DOI: DOI: 10.1007/978-981-97-4018-5Online resources: Summary: Chapter 1 Introduction -- Chapter 2 Fundamentals of Safety-Critical System -- Chapter 3 Important Aspects of Cyber Security -- Chapter 4 Mathematical Background -- Chapter 5 Security Analysis Models -- Chapter 6 Comparative Study of Analytical Models -- Chapter 7 Conclusion.Summary: The book introduces dependability (security metric) ideas, gives a general overview of the security analysis of Safety-Critical Systems (SCSs), explains why the study is necessary and defines key terms relevant to this research. It makes an effort to emphasize the significance of security in comparison to other dependability indicators and illustrates the key drivers of this research's purpose. The mathematical foundation of the security analysis process is briefly illustrated, and key mathematical terminology and concepts are presented that are crucial for the security evaluation of critical systems. This book's objective is to provide a thorough understanding of the security analysis process. It will be a research-focused book designed for undergraduate, graduate, and doctoral courses in software and cyber security. The fundamentals of reliability, security, metrics, and mathematical foundation have been covered in this book. Each technique's actual applications, along with benefitsand drawbacks, are also shown. Applying each technique to the various case studies serves as a demonstration of how it works. By using the many case studies of safety-critical systems, the students can also learn different analysis approaches and how to model them. Students will be able to use these tools, in particular, on a case study of their choice to analyze system security. The book includes a comparison of various strategies and appropriate recommendations for further reading on these subjects. Moreover, this book's target audience includes software professionals who are interested in security analysis.PPN: PPN: 1899173250Package identifier: Produktsigel: ZDB-2-SEB | ZDB-2-BUM | ZDB-2-SXBM
No physical items for this record