Abstract

In this paper we review the key trends related to application of information technology and, in particular, automated data analysis to the problem of protecting critical infrastructure. We focus on technologies that use automated data collection and analyses that can be exploited for improving security provision for critical infrastructure in the future. Of our particular interest are technologies that are at relatively early stage of adaptation and in our judgement have potential to significantly affect how the security is provided in the future, the technologies that support physical aspect of security. Then we discuss analytics in context of cyber-security with applications.

Highlights

  • In this paper we review the key trends related to application of information technology and, in particular, automated data analysis to the challenge of protecting critical infrastructure

  • We focus on technologies that use automated data collection and analyses that can be exploited for improving security provision for critical infrastructure in the future

  • It is likely that the development of analytical tools for cybersecurity will be intensified in the future, as cyber-security is being put in the spot light by industry and governments

Read more

Summary

Data for analytics and security

The terrorist attacks in September 2001 have changed the perception of critical infrastructure security These attacks were characterised by sophistication of planning and execution but as well the selection of targets – a diverse set of critical infrastructure buildings that included government, defence and commerce [1]. We focus on technologies that use automated data collection and analyses that can be exploited for improving security provision for critical infrastructure in the future. Data analytics [3] is the process of discovery and communication of meaningful patterns in data typically with use of data-mining techniques [4] It has become a very prominent trend especially in business context (often referred to as business intelligence). We review key classes of technologies that, in our opinion, are becoming prominent for providing security and rely upon or explicitly use analytics

Biometrics
Video analytics
Sensing technologies
Integration
Cyber-security
Conclusions
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.