Introduction to the Book
In this introductory chapter, we illustrate the book’s motivation and objective. In particular, the book takes its raison d’être from the need for protecting Cyber-Physical Systems (CPSsCyber-Physical Systems (CPS)) against threats originating either in the cyber or in the physical domain. Exploring...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buchkapitel |
Sprache: | eng |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | In this introductory chapter, we illustrate the book’s motivation and objective. In particular, the book takes its raison d’être from the need for protecting Cyber-Physical Systems (CPSsCyber-Physical Systems (CPS)) against threats originating either in the cyber or in the physical domain. Exploring the concepts of safetySafety, securitySecurity, and privacyPrivacy for CPSsCyber-Physical Systems (CPS) thus emerged as the natural goal to reach. In order to better support this objective and to help the reader to navigate the book contents, a taxonomy of the above-mentioned concepts is introduced, based on a set of three triads, including the well-known Confidentiality, Integrity, and AvailabilityAvailabilityIntegrityConfidentiality triad which was introduced in the Information Technology securitySecurity literature. |
---|---|
ISSN: | 0170-8643 1610-7411 |
DOI: | 10.1007/978-3-030-65048-3_1 |