Cargando…

Critical infrastructure protection in homeland security : defending a networked nation /

" ... Excellent for use as a text in information assurance or cyber-security courses ... I strongly advocate that professors ... examine this book with the intention of using it in their programs." (Computing Reviews.com, March 22, 2007) "The book is written as a student textbook, but...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Lewis, T. G. (Theodore Gyle), 1941-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, New Jersey : John Wiley & Sons, [2014]
Edición:2nd edition.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn879851997
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |||||||||||
008 140514s2014 nju ob 001 0 eng
010 |a  2014019059 
040 |a DLC  |b eng  |e rda  |e pn  |c DLC  |d YDX  |d EBLCP  |d YDXCP  |d N$T  |d DEBSZ  |d UMI  |d COO  |d DEBBG  |d ZCU  |d MERUC  |d OCLCA  |d NJR  |d OCLCQ  |d OCLCA  |d OCLCQ  |d OCLCF  |d ICG  |d AU@  |d OCLCQ  |d DKC  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 902984656  |a 903395578  |a 908280390 
020 |a 9781118817704  |q (pdf) 
020 |a 1118817702  |q (pdf) 
020 |a 9781118817667  |q (epub) 
020 |a 1118817664  |q (epub) 
020 |a 9781118817643 
020 |a 1118817648 
020 |a 111881763X 
020 |a 9781118817636 
020 |z 9781118817636  |q (cloth) 
029 1 |a CHNEW  |b 000889067 
029 1 |a CHVBK  |b 374477868 
029 1 |a DEBBG  |b BV042487497 
029 1 |a DEBBG  |b BV044070798 
029 1 |a DEBSZ  |b 420084975 
029 1 |a DEBSZ  |b 431796947 
029 1 |a DEBSZ  |b 434828955 
029 1 |a DEBSZ  |b 449455688 
029 1 |a AU@  |b 000052883831 
035 |a (OCoLC)879851997  |z (OCoLC)902984656  |z (OCoLC)903395578  |z (OCoLC)908280390 
037 |a CL0500000551  |b Safari Books Online 
042 |a pcc 
043 |a n-us--- 
050 0 0 |a QA76.9.A25 
072 7 |a COM  |x 043050  |2 bisacsh 
082 0 0 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Lewis, T. G.  |q (Theodore Gyle),  |d 1941- 
245 1 0 |a Critical infrastructure protection in homeland security :  |b defending a networked nation /  |c Ted G. Lewis. 
250 |a 2nd edition. 
264 1 |a Hoboken, New Jersey :  |b John Wiley & Sons,  |c [2014] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
588 0 |a Print version record and CIP data provided by publisher. 
504 |a Includes bibliographical references and index. 
505 0 |a Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation -- Copyright -- Contents -- Preface -- How to Use this Book -- Acknowledgment -- Part I Origins of Homeland Security and Critical Infrastructure Protection Policy -- Chapter 1 Origins of Critical Infrastructure Protection -- 1.1 Recognition -- 1.2 Natural Disaster Recovery -- 1.3 Definitional Phase -- 1.4 Public-Private Cooperation -- 1.5 Federalism: Whole of Government -- 1.6 Infrastructure Protection within DHS -- 1.7 Implementing a Risk Strategy -- 1.7.1 Risk-Informed Decision-Making -- 1.7.2 Resilience-Informed Decision-Making -- 1.7.3 Prevention or Response? -- 1.8 Analysis -- 1.8.1 The PPP Conundrum -- 1.8.2 The Information-Sharing Conundrum -- 1.8.3 Climate Change Conundrum -- 1.8.4 The Funding Conundrum -- 1.8.5 Spend 80% on 20% of the Country -- 1.9 Exercises -- References -- Part II Theory and Foundations -- Chapter 2 Risk Strategies -- 2.1 EUT -- 2.1.1 Threat-Asset Pairs -- 2.2 PRA and Fault Trees -- 2.2.1 An Example: Your Car -- 2.3 MBRA and Resource Allocation -- 2.3.1 Another Example: Redundant Power -- 2.4 PRA in the Supply Chain -- 2.5 Protection versus Response -- 2.6 Threat Is an Output -- 2.7 Bayesian Belief Networks -- 2.8 A BN for Threat -- 2.9 Risk of a Natural Disaster -- 2.10 Earthquakes -- 2.11 Black Swans and Risk -- 2.12 Black Swan Floods -- 2.13 Are Natural Disasters Getting Worse? -- 2.14 Black Swan al Qaeda Attacks -- 2.15 Black Swan Pandemic -- 2.16 Risk and Resilience -- 2.17 Exercises -- References -- Chapter 3 Theories of Catastrophe -- 3.1 NAT -- 3.2 Blocks and Springs -- 3.3 Bak's Punctuated Equilibrium Theory -- 3.4 TOC -- 3.4.1 The State Space Diagram -- 3.5 The U.S. Electric Power Grid -- 3.6 POE -- 3.6.1 The Great Recessions -- 3.6.2 Too Much Money -- 3.7 Competitive Exclusion -- 3.7.1 Gause's Law. 
505 8 |a 3.7.2 The Self-Organizing Internet -- 3.7.3 A Monoculture -- 3.8 POR -- 3.9 Resilience of Complex Infrastructure Systems -- 3.9.1 Expected Utility and Risk -- 3.9.2 SOC -- 3.9.3 TOC -- 3.9.4 POE and nonlinearity -- 3.9.5 CEP and loss of redundancy -- 3.9.6 POR and percolation -- 3.10 Emergence -- 3.10.1 Opposing Forces in Emergent CIKR -- 3.11 Exercises -- References -- Chapter 4 Complex CIKR Systems -- 4.1 CIKR as Networks -- 4.1.1 Emergence -- 4.1.2 Classes of CIKR Networks -- 4.1.3 Self-Organized Networks -- 4.2 Cascading CIKR Systems -- 4.2.1 The Fundamental Resilience Equation -- 4.2.2 Targeted Attacks -- 4.3 Network Flow Resilience -- 4.4 Paradox of Redundancy -- 4.4.1 Link Percolation and Robustness -- 4.4.2 Node Percolation and Robustness -- 4.4.3 Blocking Nodes -- 4.5 Network Risk -- 4.5.1 Crude Oil and KeystoneXL -- 4.5.2 MBRA Network Resource Allocation -- 4.6 Exercises -- Reference -- Part III Individual Sectors -- Chapter 5 Communications -- 5.1 Early Years -- 5.2 Regulatory Structure -- 5.3 The Architecture of the Communication Sector -- 5.3.1 Physical Infrastructure -- 5.3.2 Wireless Networks -- 5.3.3 Extraterrestrial Communication -- 5.3.4 LESs -- 5.3.5 Cellular Networks -- 5.3.6 Generations -- 5.3.7 Wi-Fi Technology -- 5.4 Risk Analysis -- 5.4.1 Importance of Carrier Hotels -- 5.4.2 Network Analysis -- 5.4.3 Flow Analysis -- 5.4.4 Robustness -- 5.4.5 HPM Attacks -- 5.5 Cellular Network Threats -- 5.5.1 Cyber Threats -- 5.5.2 HPM-Like Threats -- 5.5.3 Physical Threats -- 5.6 Analysis -- 5.7 Exercises -- References -- Chapter 6 Internet -- 6.1 Internet as a Disruptive Technology -- 6.2 The Autonomous System Network -- 6.2.1 The AS500 Network -- 6.3 Origins of TCP/IP -- 6.3.1 DNS Basics -- 6.4 Internet Standards -- 6.4.1 Email -- 6.4.2 TCP/IP -- 6.5 Toward Commercialization -- 6.6 The WWW -- 6.7 Internet Governance -- 6.7.1 IAB and IETF. 
505 8 |a 6.7.2 ICANN Wars -- 6.7.3 ISOC -- 6.7.4 W3C -- 6.7.5 A Final Example -- 6.8 Analysis -- 6.9 Exercises -- References -- Chapter 7 Cyber Threats -- 7.1 Script Kiddies and Black-Hats -- 7.1.1 Script-Kiddies -- 7.1.2 Black-Hats -- 7.1.3 Weaponized Exploits -- 7.2 Tools of the Trade -- 7.2.1 The First Exploit -- 7.2.2 TCP/IP Flaws -- 7.2.3 Open Ports -- 7.2.4 Buffer Overflow Exploits -- 7.2.5 DDoS Attacks -- 7.2.6 E-mail Exploits -- 7.2.7 Flawed Application and System Software -- 7.3 Botnets -- 7.4 Cyber Risk Analysis -- 7.5 Cyber Infrastructure Risk -- 7.5.1 Blocking Node Analysis -- 7.6 Analysis -- 7.7 Exercises -- References -- Chapter 8 Information Technology -- 8.1 Principles of IT Security -- 8.2 Enterprise Systems -- 8.2.1 Loss of Service -- 8.2.2 Loss of Data -- 8.2.3 Loss of Security -- 8.3 Cyber Defense -- 8.3.1 Authenticate Users -- 8.3.2 TP -- 8.3.3 Inside the DMZ -- 8.4 Basics of Encryption -- 8.4.1 DES -- 8.4.2 3DES -- 8.4.3 AES -- 8.5 Asymmetric Encryption -- 8.5.1 Public Key Encryption -- 8.6 RSA Illustrated -- 8.7 PKI -- 8.7.1 Definition of PKI -- 8.7.2 Certificates -- 8.8 Countermeasures -- 8.9 Exercises -- References -- Chapter 9 Cybersecurity Policy -- 9.1 A National Priority and a (Familiar) Call to Arms -- 9.1.1 Infrastructure as Target: From Hypothetical Concern to a Growing Threat -- 9.1.2 A Difficult Terrain: Convergence, Attribution, and the Production of Cyber Weapons -- 9.2 Rewriting Cybersecurity Policy: The Difficulty of Reform -- 9.2.1 A False Start: The Cybersecurity Act of 2012 -- 9.2.2 EO 13636: Improving Critical Infrastructure Cybersecurity -- 9.2.3 The NIST Framework: The Peril and the Promise of Voluntary Standards -- 9.2.4 ECS: The Possibilities and Limits of Information Sharing -- 9.3 Cybersecurity, Critical Infrastructure, and Public Policy: An Ongoing-and Difficult-Evolution. 
505 8 |a 9.3.1 Policy Options: Looking Forward -- 9.4 Exercises -- References -- Chapter 10 Supervisory Control and Data Acquisition -- 10.1 What Is SCADA? -- 10.2 SCADA versus Enterprise Computing Differences -- 10.3 Common Threats -- 10.4 Who Is in Charge? -- 10.5 SCADA Everywhere -- 10.6 SCADA Risk Analysis -- 10.7 San Francisco Public Utilities Commission SCADA Redundancy -- 10.7.1 Redundancy as a Resiliency Mechanism -- 10.7.2 Risk Reduction and Resource Allocation -- 10.8 Analysis -- 10.9 Exercises -- Chapter 11 Water and Water Treatment -- 11.1 From Germs to Terrorists -- 11.1.1 SDWA -- 11.1.2 The Water Information Sharing and Analysis Center -- 11.2 Foundations: SDWA of 1974 -- 11.3 The Bioterrorism Act of 2002 -- 11.3.1 Is Water for Drinking? -- 11.4 The Architecture of Water Systems -- 11.4.1 The Law of the River -- 11.5 The Hetch Hetchy Network -- 11.5.1 Betweenness Analysis -- 11.6 Cascade Analysis -- 11.6.1 Multidimensional Analysis -- 11.6.2 Blocking Nodes -- 11.7 Hetch Hetchy Investment Strategies -- 11.7.1 The Rational Actor Attacker -- 11.8 Hetch Hetchy Threat Analysis -- 11.8.1 Chem-Bio Threats -- 11.8.2 Earthquake Threats -- 11.8.3 Allocation to Harden Threat-Asset Pairs -- 11.9 Analysis -- 11.10 Exercises -- References -- Chapter 12 Energy -- 12.1 Energy Fundamentals -- 12.2 Regulatory Structure of the Energy Sector -- 12.2.1 Evolution of Energy Regulation -- 12.2.2 Other Regulation -- 12.2.3 The Electric Sector ISAC -- 12.3 Interdependent Coal -- 12.3.1 Interdependency with Transportation -- 12.4 The Rise of Oil and the Automobile -- 12.4.1 Oil -- 12.4.2 NG -- 12.5 Energy Supply Chains -- 12.5.1 Petroleum Administration for Defense Districts -- 12.5.2 Refineries -- 12.5.3 Transmission -- 12.5.4 Transport4 -- 12.5.5 Storage -- 12.5.6 NG Supply Chains -- 12.5.7 SCADA -- 12.6 The Critical Gulf of Mexico Cluster -- 12.6.1 Refineries. 
505 8 |a 12.6.2 Transmission Pipelines -- 12.6.3 Storage -- 12.7 Threat Analysis of the Gulf of Mexico Supply Chain -- 12.8 Network Analysis of the Gulf of Mexico Supply Chain -- 12.9 The KeystoneXL Pipeline Controversy -- 12.10 The NG Supply Chain -- 12.11 Analysis -- 12.12 Exercises -- References -- Chapter 13 Electric Power -- 13.1 The Grid -- 13.2 From Death Rays to Vertical Integration -- 13.2.1 Early Regulation -- 13.2.2 Deregulation and EPACT 1992 -- 13.2.3 Energy Sector ISAC -- 13.3 Out of Orders 888 and 889 Comes Chaos -- 13.3.1 Economics versus Physics -- 13.3.2 Betweenness Increases SOC -- 13.4 The North American Grid -- 13.4.1 ACE and Kirchhoff's Law -- 13.5 Anatomy of a Blackout -- 13.5.1 What Happened on August 14th, 2003 -- 13.6 Threat Analysis -- 13.6.1 Attack Scenario 1: Disruption of Fuel Supply to Power Plants -- 13.6.2 Attack Scenario 2: Destruction of Major Transformers -- 13.6.3 Attack Scenario 3: Disruption of SCADA Communications -- 13.6.4 Attack Scenario 4: Creation of a Cascading Transmission Failure -- 13.7 Risk Analysis -- 13.8 Analysis of WECC -- 13.9 Analysis -- 13.10 Exercises -- References -- Chapter 14 Healthcare and Public Health -- 14.1 The Sector Plan -- 14.2 Roemer's Model -- 14.2.1 Components of Roemer's Model -- 14.3 The Complexity of Public Health -- 14.4 Risk Analysis of HPH Sector -- 14.5 Bioterrorism -- 14.5.1 Classification of Biological Agents -- 14.6 Epidemiology -- 14.6.1 The Kermack-McKendrick Model -- 14.6.2 SARS -- 14.7 Predicting Pandemics -- 14.7.1 The Levy Flight Theory of Pandemics -- 14.8 Biosurveillance -- 14.8.1 Healthmap -- 14.8.2 Big Data -- 14.8.3 GeoSentinel -- 14.9 Network Pandemics -- 14.10 The World Travel Network -- 14.11 Exercises -- References -- Chapter 15 Transportation -- 15.1 Transportation under Transformation -- 15.2 The Road to Prosperity -- 15.2.1 Economic Impact -- 15.2.2 The NHS. 
520 |a " ... Excellent for use as a text in information assurance or cyber-security courses ... I strongly advocate that professors ... examine this book with the intention of using it in their programs." (Computing Reviews.com, March 22, 2007) "The book is written as a student textbook, but it should be equally valuable for current practitioners ... this book is a very worthwhile investment." (Homeland Security Watch, August 17, 2006) While the emphasis is on the development of policies that lead to successful prevention of terrorist attacks on the nation's infrastructure, this book is the first scientific study of critical infrastructures and their protection. The book models the nation's most valuable physical assets and infrastructure sectors as networks of nodes and links. It then analyzes the network to identify vulnerabilities and risks in the sector combining network science, complexity theory, modeling and simulation, and risk analysis. The most critical components become the focus of deeper analysis and protection. This approach reduces the complex problem of protecting water supplies, energy pipelines, telecommunication stations, Internet and Web networks, and power grids to a much simpler problem of protecting a few critical nodes. The new edition incorporates a broader selection of ideas and sectors and moves the mathematical topics into several appendices. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer networks  |x Security measures  |z United States. 
650 0 |a Computer security  |z United States  |x Planning. 
650 0 |a Terrorism  |z United States  |x Prevention. 
650 0 |a Terrorism  |x Government policy  |z United States. 
650 0 |a Civil defense  |z United States. 
650 0 |a Public utilities  |x Protection  |z United States. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |z États-Unis. 
650 6 |a Sécurité informatique  |z États-Unis  |x Planification. 
650 6 |a Terrorisme  |x Politique gouvernementale  |z États-Unis. 
650 6 |a Services publics  |x Protection  |z États-Unis. 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a Civil defense  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Terrorism  |x Government policy  |2 fast 
650 7 |a Terrorism  |x Prevention  |2 fast 
651 7 |a United States  |2 fast 
758 |i has work:  |a Critical infrastructure protection in homeland security (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGBhT6gvBQT9Q6mwjGtf9C  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Lewis, T.G. (Theodore Gyle), 1941-  |t Critical infrastructure protection in homeland security.  |b 2nd edition.  |d Hoboken, New Jersey : John Wiley & Sons, [2014]  |z 9781118817636  |w (DLC) 2014018628 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1813343  |z Texto completo 
938 |a EBSCOhost  |b EBSC  |n 867509 
938 |a YBP Library Services  |b YANK  |n 12116832 
994 |a 92  |b IZTAP