Introduction

Stefan Rass, Stefan Schauer, Sandra König, Quanyan Zhu

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

This chapter opens the book by introducing the characteristics and particularities of critical infrastructures. Their existence and interplay forms a vital pillar of contemporary societies, and their protection is a top duty of governments and security research. Recent years have shown a paradigm shift of cyber-attacks from specific individual threat and attack scenarios, to a modern combination of various attack types and strategies to what we call an advanced persistent threat (APT) today. This term describes a diverse class of attacks that all share a set of common characteristics, which presents new challenges to security that demand urgent and continuous action by practitioners, researchers and every stakeholder of a critical infrastructure. The main focus of the book is describing game theory as a tool to establish security against APTs, and to this end, the introduction here starts with the abstract characteristics of an APT, showcasing them with a set of selected real-life documented cases of APTs that ends the chapter.

Original languageEnglish (US)
Title of host publicationAdvanced Sciences and Technologies for Security Applications
PublisherSpringer
Pages3-20
Number of pages18
DOIs
StatePublished - 2020

Publication series

NameAdvanced Sciences and Technologies for Security Applications
ISSN (Print)1613-5113
ISSN (Electronic)2363-9466

ASJC Scopus subject areas

  • Safety, Risk, Reliability and Quality
  • Safety Research
  • Political Science and International Relations
  • Computer Science Applications
  • Computer Networks and Communications
  • Health, Toxicology and Mutagenesis

Fingerprint Dive into the research topics of 'Introduction'. Together they form a unique fingerprint.

  • Cite this

    Rass, S., Schauer, S., König, S., & Zhu, Q. (2020). Introduction. In Advanced Sciences and Technologies for Security Applications (pp. 3-20). (Advanced Sciences and Technologies for Security Applications). Springer. https://doi.org/10.1007/978-3-030-46908-5_1