Critical Infrastructure Protection.
Annotation
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
IOS Press,
2014.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- ""CRITICAL INFRASTRUCTURE PROTECTION""; ""Preface""; ""Contents""; ""NATO and Critical Infrastructure Resilience � Planning for the Unknown""; ""Introduction""; ""1. Environmental Hazards""; ""2. Industrial Accidents""; ""3. Deliberate sabotage and attack""; ""4. Consequential Sabotage""; ""5. Critical Infrastructure and Cybersecurity""; ""6. The 'Unknown Unknowns'""; ""Conclusion""; ""Bibliography""; ""Critical Infrastructure Protection: The EU Perspective""; ""Introduction""; ""1. Background""; ""2. State of Play at the EU Level Regarding CIP""; ""3. Main Features of EPCIP""
- ""4. The Way Ahead: What's Next in 2012?""""Conclusion""; ""Leveraging Partnerships to Better Utilize Declining Resources: The Critical Infrastructure Risk Management Enhancement Initiative""; ""Introduction""; ""1. The Current Challenge""; ""2. The Current Environment for Critical Infrastructure Protection and Resilience""; ""3. The Critical Infrastructure Risk Management Enhancement Initiative (CIRMEI)""; ""4. Managing Risk""; ""5. DHS Critical Infrastructure Regional Initiative""; ""6. CIRMEI in Practice""
- ""7. Responding to the Findings: Regional Resiliency Assessment Program (RRAP) as a Case Study""""8. Tapping the International Community""; ""Conclusion""; ""Bibliography""; ""Critical Infrastructure Protection in a Post-9/11 World""; ""Introduction""; ""1. What Threatens Critical Infrastructure?""; ""2. Post 9/11 CIP � A Case Study""; ""Conclusion""; ""Bibliography""; ""Practical Issues Facing Businesses in the Implementation of Critical Infrastructure Protection""; ""Introduction""; ""1. Implementing CIP Protection in Business""; ""2. The Government Dilemma""
- ""3. Private-Public Partnerships""""Conclusion""; ""Critical Infrastructure and Its Impact on Energy Security""; ""Introduction""; ""1. Definition: What does Energy Security Mean?""; ""2. Maximizing Energy Security""; ""Conclusion""; ""Bibliography""; ""Threats to Energy Resources and Infrastructure""; ""Introduction""; ""1. Cyberattack""; ""2. Conventional Warfare""; ""3. Unconventional Warfare""; ""4. Criminal Activity""; ""Conclusion""; ""Bibliography""; ""ANNEX A""; ""Assessing the Terrorist Threat to Critical Energy Infrastructure and Vulnerabilities""; ""Needs and Options for Response""
- ""Opportunities for International Cooperation""""Conclusion""; ""Protecting Pipelines
- BTC as a Case Study""; ""Introduction""; ""1. Critical Energy Infrastructure Security""; ""2. Pipelines in Turkey""; ""3. Security Threats against Pipelines""; ""4. BTC�s Holistic Security Strategy""; ""5. The Way Forward""; ""Conclusion""; ""Bibliography""; ""An Analysis of a Cyberattack on a Nuclear Plant: The STUXNET Worm""; ""Introduction""; ""1. A History of Malware""; ""2. The STUXNET Worm""; ""3. The Impact of STUXNET""; ""Conclusion""; ""Bibliography""