Peer Reviewed Journal via three different mandatory reviewing processes, since 2006, and, from September 2020, a fourth mandatory peer-editing has been added.
The implementation of a cyber security system for critical
infrastructures requires the extensive use and the targeted
application of the most modern computer and communication
technologies. In fact, cyber crime, as many other illegal
activities, has gained momentum from the latest expansion
and power of the Internet and from the widespread use of the
sophisticated tools used in the networks, especially social
networks. Combating cyber crime needs the same synergy
between human and machine technologies as done by
cyberspace hackers to attack their objectives. This paper aims
to making a review of these technologies and drawing the
guidelines for an efficient design of a cyber security system,
with reference to the defense of critical infrastructures.