Cargando…

Critical Infrastructure Protection.

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Edwards, M.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: IOS Press, 2014.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • ""CRITICAL INFRASTRUCTURE PROTECTION""; ""Preface""; ""Contents""; ""NATO and Critical Infrastructure Resilience â€? Planning for the Unknown""; ""Introduction""; ""1. Environmental Hazards""; ""2. Industrial Accidents""; ""3. Deliberate sabotage and attack""; ""4. Consequential Sabotage""; ""5. Critical Infrastructure and Cybersecurity""; ""6. The 'Unknown Unknowns'""; ""Conclusion""; ""Bibliography""; ""Critical Infrastructure Protection: The EU Perspective""; ""Introduction""; ""1. Background""; ""2. State of Play at the EU Level Regarding CIP""; ""3. Main Features of EPCIP""
  • ""4. The Way Ahead: What's Next in 2012?""""Conclusion""; ""Leveraging Partnerships to Better Utilize Declining Resources: The Critical Infrastructure Risk Management Enhancement Initiative""; ""Introduction""; ""1. The Current Challenge""; ""2. The Current Environment for Critical Infrastructure Protection and Resilience""; ""3. The Critical Infrastructure Risk Management Enhancement Initiative (CIRMEI)""; ""4. Managing Risk""; ""5. DHS Critical Infrastructure Regional Initiative""; ""6. CIRMEI in Practice""
  • ""7. Responding to the Findings: Regional Resiliency Assessment Program (RRAP) as a Case Study""""8. Tapping the International Community""; ""Conclusion""; ""Bibliography""; ""Critical Infrastructure Protection in a Post-9/11 World""; ""Introduction""; ""1. What Threatens Critical Infrastructure?""; ""2. Post 9/11 CIP â€? A Case Study""; ""Conclusion""; ""Bibliography""; ""Practical Issues Facing Businesses in the Implementation of Critical Infrastructure Protection""; ""Introduction""; ""1. Implementing CIP Protection in Business""; ""2. The Government Dilemma""
  • ""3. Private-Public Partnerships""""Conclusion""; ""Critical Infrastructure and Its Impact on Energy Security""; ""Introduction""; ""1. Definition: What does Energy Security Mean?""; ""2. Maximizing Energy Security""; ""Conclusion""; ""Bibliography""; ""Threats to Energy Resources and Infrastructure""; ""Introduction""; ""1. Cyberattack""; ""2. Conventional Warfare""; ""3. Unconventional Warfare""; ""4. Criminal Activity""; ""Conclusion""; ""Bibliography""; ""ANNEX A""; ""Assessing the Terrorist Threat to Critical Energy Infrastructure and Vulnerabilities""; ""Needs and Options for Response""
  • ""Opportunities for International Cooperation""""Conclusion""; ""Protecting Pipelines
  • BTC as a Case Study""; ""Introduction""; ""1. Critical Energy Infrastructure Security""; ""2. Pipelines in Turkey""; ""3. Security Threats against Pipelines""; ""4. BTCâ€?s Holistic Security Strategy""; ""5. The Way Forward""; ""Conclusion""; ""Bibliography""; ""An Analysis of a Cyberattack on a Nuclear Plant: The STUXNET Worm""; ""Introduction""; ""1. A History of Malware""; ""2. The STUXNET Worm""; ""3. The Impact of STUXNET""; ""Conclusion""; ""Bibliography""