Skip to main content

Convergent Evolution of IT Security Paradigm: From Access Control to Cyber-Defense

  • Chapter
  • First Online:
The Economics of Digital Transformation

Abstract

The information technology revolution (Industry 4.0) has led to the creation of the concept of cyber-physical systems. Digitalization has brought all the urgency of information security problems, which depend on the efficiency of modern production on targeted and random destructive impact, which lead to hidden, remote, and difficult to detect effects that can cause catastrophic consequences. The information security problems of cyber-physical systems require the development of a new security methodology. In this paper, it is proposed to interpret the security of cyber-physical systems as the preservation of the sustainable functioning of the cyber-physical system in the context of a targeted destructive impact on its information components. Cybersecurity methodology extends the objects of protection from data or key information to control systems as telecommunications equipment and actuators in the energy and manufacturing. This paper describes the process of transition from access control to cyber-defense for securing cyber-physical systems.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 119.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 159.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Anderson, J. P. (1972). ‘Computer security technology planning study’. Electronic systems division, air force systems command. Bedford, MA: Hanscom Field.

    Google Scholar 

  • Aström, K. J., & Murray, R.,. M. (2010). Feedback systems: An introduction for scientists and engineers. Princeton University Press.

    Google Scholar 

  • Bellman, R. (2008). Stability theory of differential equations. Courier Corporation.

    Google Scholar 

  • Bishop, M. (2003). Computer security: Art and science. Boston: Addison Wesley.

    Google Scholar 

  • Calder, A. (2009). Information security based on ISO 27001/ISO 27002: A management guide–best practice. Hertogenbosch: Van Haren Publishing.

    Google Scholar 

  • Chen, S., & Billings, S. A. (1989). Representations of nonlinear system: The NARMAX model. International Journal of Control, 49(3), 1013–1032.

    Article  Google Scholar 

  • Clayton, G. E. (2009). Data loss prevention and monitoring in the workplace: Best practice guide. Dallas, USA: Privacy Compliance Group, Inc.

    Google Scholar 

  • Corin, R., Etalle, S., den Hartog, J., Lenzini, G., & Staicu, I. (2005). A logic for auditing accountability in decentralized systems. In T. Dimitrakos & F. Martinelli (Eds.), Formal aspects in security and trust. IFIP WCC TC1 2004. IFIP International Federation for Information Processing (Vol. 173). Boston, MA: Springer.

    Google Scholar 

  • Gupta, A., Kuppili, P., Akella, A., & Barford, P. (2009). An empirical study of malware evolution. 2009 First International Communication Systems and Networks and Workshops.

    Google Scholar 

  • Jasim, O. K., Abbas, S., & Salem, A. B. M. (2015). Evolution of an emerging symmetric quantum cryptographic algorithm. Journal of Information Security, 6, 82–91.

    Article  Google Scholar 

  • Kilian, C. T. (2006). Modern control technology: Components and systems. Thompson Delmar Learning.

    Google Scholar 

  • Lacey, D. (2013). Advanced persistent threats: How to manage the risk to your business. ISACA.

    Google Scholar 

  • Lavrova, D. S., Alekseev, I. V., & Shtyrkina, A. A. (2018). Security analysis based on controlling dependences of network traffic parameters by wavelet transformation. Automatic Control and Computer Sciences, 52(8), 931–935.

    Article  Google Scholar 

  • Pavlenko, E. Y., Yarmak, A. V., & Moskvin, D. A. (2017). Hierarchical approach to analyzing security breaches in information systems. Automatic Control and Computer Sciences, 51(8), 829–834.

    Article  Google Scholar 

  • Rattner, D. (2010). Risk Assessments. Security management. Boston: Northeastern University.

    Google Scholar 

  • Rothman, M. (2010). Understanding and Selecting SIEM/Log Management. Securosis, Blog https://securosis.com/blog/understanding-and-selecting-siem-log-management-introduction

  • Stepanova, T. (2012). Ensuring sustainability of multi-agent protection systems under the impact of distributed security threats. Ph. D. Thesis, SPbSTU.

    Google Scholar 

  • Zadorozhnyi, V. N., & Yudin, E. B. (2012). Structural properties of the scale-free Barabasi-Albert graph. Automation and Remote Control, 73(4), 702–716.

    Article  Google Scholar 

  • Zegzhda, D. P. (2016). Sustainability as a criterion for information security in cyber-physical systems. Automatic Control and Computer Sciences, 50(8), 813–819.

    Article  Google Scholar 

  • Zegzhda, P. D., Lavrova, D. S., & Shtyrkina, A. A. (2018). Multifractal analysis of internet backbone traffic for detecting denial of service attacks. Automatic Control and Computer Sciences, 52(8), 936–944.

    Article  Google Scholar 

  • Zegzhda, D. P., & Pavlenko, E. Y. (2017). Cyber-physical system homeostatic security management. Automatic Control and Computer Sciences, 51(8), 805–816.

    Article  Google Scholar 

  • Zegzhda, D. P., Poltavtseva, M. A., & Lavrova, D. S. (2017). Systematization and security assessment of cyber-physical systems. Automatic Control and Computer Sciences, 51(8), 835–843.

    Article  Google Scholar 

  • Zegzhda, P. D., & Zegzhda, D. P. (2001). Secure systems design technology. In V. I. Gorodetski, V. A. Skormin, & L. J. Popyack (Eds.), Information Assurance in Computer Networks. MMM-ACNS 2001. Lecture notes in computer science (Vol. 2052). Berlin, Heidelberg: Springer.

    Google Scholar 

  • Zhou, Y., & Jiang, X. (2012). Dissecting android malware: Characterization and evolution. 2012 IEEE symposium on security and privacy (pp. 95–109).

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dmitry P. Zegzhda .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Zegzhda, D.P. (2021). Convergent Evolution of IT Security Paradigm: From Access Control to Cyber-Defense. In: Devezas, T., Leitão, J., Sarygulov, A. (eds) The Economics of Digital Transformation. Studies on Entrepreneurship, Structural Change and Industrial Dynamics. Springer, Cham. https://doi.org/10.1007/978-3-030-59959-1_9

Download citation

Publish with us

Policies and ethics