Book description
"...excellent for use as a text in information assurance or cyber-security courses...I strongly advocate that professors...examine this book with the intention of using it in their programs." (Computing Reviews.com, March 22, 2007)
"The book is written as a student textbook, but it should be equally valuable for current practitioners...this book is a very worthwhile investment." (Homeland Security Watch, August 17, 2006)
While the emphasis is on the development of policies that lead to successful prevention of terrorist attacks on the nation's infrastructure, this book is the first scientific study of critical infrastructures and their protection. The book models the nation's most valuable physical assets and infrastructure sectors as networks of nodes and links. It then analyzes the network to identify vulnerabilities and risks in the sector combining network science, complexity theory, modeling and simulation, and risk analysis.
The most critical components become the focus of deeper analysis and protection. This approach reduces the complex problem of protecting water supplies, energy pipelines, telecommunication stations, Internet and Web networks, and power grids to a much simpler problem of protecting a few critical nodes. The new edition incorporates a broader selection of ideas and sectors and moves the mathematical topics into several appendices.
Table of contents
- Cover
- Title page
- Copyright page
- Preface
- How to Use this Book
- Acknowledgment
- Part I: Origins of Homeland Security and Critical Infrastructure Protection Policy
-
Part II: Theory and Foundations
-
2 Risk Strategies
- 2.1 EUT
- 2.2 PRA and Fault Trees
- 2.3 MBRA and Resource Allocation
- 2.4 PRA in the Supply Chain
- 2.5 Protection versus Response
- 2.6 Threat Is an Output
- 2.7 Bayesian Belief Networks
- 2.8 A BN for Threat
- 2.9 Risk of a Natural Disaster
- 2.10 Earthquakes
- 2.11 Black Swans and Risk
- 2.12 Black Swan Floods
- 2.13 Are Natural Disasters Getting Worse?
- 2.14 Black Swan al Qaeda Attacks
- 2.15 Black Swan Pandemic
- 2.16 Risk and Resilience
- 2.17 Exercises
- References
- 3 Theories of Catastrophe
- 4 Complex CIKR Systems
-
2 Risk Strategies
-
Part III: Individual Sectors
- 5 Communications
- 6 Internet
- 7 Cyber Threats
- 8 Information Technology
- 9 Cybersecurity Policy
- 10 Supervisory Control and Data Acquisition
-
11 Water and Water Treatment
- 11.1 From Germs to Terrorists
- 11.2 Foundations: SDWA of 1974
- 11.3 The Bioterrorism Act of 2002
- 11.4 The Architecture of Water Systems
- 11.5 The Hetch Hetchy Network
- 11.6 Cascade Analysis
- 11.7 Hetch Hetchy Investment Strategies
- 11.8 Hetch Hetchy Threat Analysis
- 11.9 Analysis
- 11.10 Exercises
- References
-
12 Energy
- 12.1 Energy Fundamentals
- 12.2 Regulatory Structure of the Energy Sector
- 12.3 Interdependent Coal
- 12.4 The Rise of Oil and the Automobile
- 12.5 Energy Supply Chains
- 12.6 The Critical Gulf of Mexico Cluster
- 12.7 Threat Analysis of the Gulf of Mexico Supply Chain
- 12.8 Network Analysis of the Gulf of Mexico Supply Chain
- 12.9 The KEYSTONEXL Pipeline Controversy
- 12.10 The NG Supply Chain
- 12.11 Analysis
- 12.12 Exercises
- References
- 13 Electric Power
- 14 Healthcare and Public Health
- 15 Transportation
- 16 Supply Chains
- 17 Banking and Finance
- Appendix A: Math: Probability Primer
- Appendix B: Math: Risk and Resilience
- Appendix C: Math: Spectral Radius
- Appendix D: Math: Tragedy of the Commons
- Appendix E: Glossary
- Index
- End User License Agreement
Product information
- Title: Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation, 2nd Edition
- Author(s):
- Release date: November 2014
- Publisher(s): Wiley
- ISBN: 9781118817636
You might also like
book
Critical Infrastructure System Security and Resiliency
Security protections for critical infrastructure nodes are intended to minimize the risks resulting from an initiating …
book
Lessons Learned: Critical Information Infrastructure Protection- How to protect critical information infrastructure
"I loved the quotes at the beginning of each chapter – very interesting and thought-provoking. I …
book
A Leader's Guide to Cybersecurity
Cybersecurity threats are on the rise. As a leader, you need to be prepared to keep …
book
Handbook on Securing Cyber-Physical Critical Infrastructure
The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on …