Policy takes an important role in most security management systems including critical cyber-physical infrastructure. Since policies are specified by the administrators of the system, the specification must consider human factors such as ease of understanding. Policies should also be analyzable formally so that it is possible to verify policy implementations and detect potential conflicts and inconsistencies. This Part consists of three chapters on policy issues and configuration management.

Chapter 22 titled “Managing and Securing Critical Infrastructure – A Semantic Policy and Trust Driven Approach” considers the use of high-level semantic policies to manage the trust relationship among entities involved in a cyber-physical infrastructure when ...

Get Handbook on Securing Cyber-Physical Critical Infrastructure now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.