Cargando…

Critical infrastructure protection in homeland security : defending a networked nation /

" ... Excellent for use as a text in information assurance or cyber-security courses ... I strongly advocate that professors ... examine this book with the intention of using it in their programs." (Computing Reviews.com, March 22, 2007) "The book is written as a student textbook, but...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Lewis, T. G. (Theodore Gyle), 1941-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, New Jersey : John Wiley & Sons, [2014]
Edición:2nd edition.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation
  • Copyright
  • Contents
  • Preface
  • How to Use this Book
  • Acknowledgment
  • Part I Origins of Homeland Security and Critical Infrastructure Protection Policy
  • Chapter 1 Origins of Critical Infrastructure Protection
  • 1.1 Recognition
  • 1.2 Natural Disaster Recovery
  • 1.3 Definitional Phase
  • 1.4 Public-Private Cooperation
  • 1.5 Federalism: Whole of Government
  • 1.6 Infrastructure Protection within DHS
  • 1.7 Implementing a Risk Strategy
  • 1.7.1 Risk-Informed Decision-Making
  • 1.7.2 Resilience-Informed Decision-Making
  • 1.7.3 Prevention or Response?
  • 1.8 Analysis
  • 1.8.1 The PPP Conundrum
  • 1.8.2 The Information-Sharing Conundrum
  • 1.8.3 Climate Change Conundrum
  • 1.8.4 The Funding Conundrum
  • 1.8.5 Spend 80% on 20% of the Country
  • 1.9 Exercises
  • References
  • Part II Theory and Foundations
  • Chapter 2 Risk Strategies
  • 2.1 EUT
  • 2.1.1 Threat-Asset Pairs
  • 2.2 PRA and Fault Trees
  • 2.2.1 An Example: Your Car
  • 2.3 MBRA and Resource Allocation
  • 2.3.1 Another Example: Redundant Power
  • 2.4 PRA in the Supply Chain
  • 2.5 Protection versus Response
  • 2.6 Threat Is an Output
  • 2.7 Bayesian Belief Networks
  • 2.8 A BN for Threat
  • 2.9 Risk of a Natural Disaster
  • 2.10 Earthquakes
  • 2.11 Black Swans and Risk
  • 2.12 Black Swan Floods
  • 2.13 Are Natural Disasters Getting Worse?
  • 2.14 Black Swan al Qaeda Attacks
  • 2.15 Black Swan Pandemic
  • 2.16 Risk and Resilience
  • 2.17 Exercises
  • References
  • Chapter 3 Theories of Catastrophe
  • 3.1 NAT
  • 3.2 Blocks and Springs
  • 3.3 Bak's Punctuated Equilibrium Theory
  • 3.4 TOC
  • 3.4.1 The State Space Diagram
  • 3.5 The U.S. Electric Power Grid
  • 3.6 POE
  • 3.6.1 The Great Recessions
  • 3.6.2 Too Much Money
  • 3.7 Competitive Exclusion
  • 3.7.1 Gause's Law.
  • 3.7.2 The Self-Organizing Internet
  • 3.7.3 A Monoculture
  • 3.8 POR
  • 3.9 Resilience of Complex Infrastructure Systems
  • 3.9.1 Expected Utility and Risk
  • 3.9.2 SOC
  • 3.9.3 TOC
  • 3.9.4 POE and nonlinearity
  • 3.9.5 CEP and loss of redundancy
  • 3.9.6 POR and percolation
  • 3.10 Emergence
  • 3.10.1 Opposing Forces in Emergent CIKR
  • 3.11 Exercises
  • References
  • Chapter 4 Complex CIKR Systems
  • 4.1 CIKR as Networks
  • 4.1.1 Emergence
  • 4.1.2 Classes of CIKR Networks
  • 4.1.3 Self-Organized Networks
  • 4.2 Cascading CIKR Systems
  • 4.2.1 The Fundamental Resilience Equation
  • 4.2.2 Targeted Attacks
  • 4.3 Network Flow Resilience
  • 4.4 Paradox of Redundancy
  • 4.4.1 Link Percolation and Robustness
  • 4.4.2 Node Percolation and Robustness
  • 4.4.3 Blocking Nodes
  • 4.5 Network Risk
  • 4.5.1 Crude Oil and KeystoneXL
  • 4.5.2 MBRA Network Resource Allocation
  • 4.6 Exercises
  • Reference
  • Part III Individual Sectors
  • Chapter 5 Communications
  • 5.1 Early Years
  • 5.2 Regulatory Structure
  • 5.3 The Architecture of the Communication Sector
  • 5.3.1 Physical Infrastructure
  • 5.3.2 Wireless Networks
  • 5.3.3 Extraterrestrial Communication
  • 5.3.4 LESs
  • 5.3.5 Cellular Networks
  • 5.3.6 Generations
  • 5.3.7 Wi-Fi Technology
  • 5.4 Risk Analysis
  • 5.4.1 Importance of Carrier Hotels
  • 5.4.2 Network Analysis
  • 5.4.3 Flow Analysis
  • 5.4.4 Robustness
  • 5.4.5 HPM Attacks
  • 5.5 Cellular Network Threats
  • 5.5.1 Cyber Threats
  • 5.5.2 HPM-Like Threats
  • 5.5.3 Physical Threats
  • 5.6 Analysis
  • 5.7 Exercises
  • References
  • Chapter 6 Internet
  • 6.1 Internet as a Disruptive Technology
  • 6.2 The Autonomous System Network
  • 6.2.1 The AS500 Network
  • 6.3 Origins of TCP/IP
  • 6.3.1 DNS Basics
  • 6.4 Internet Standards
  • 6.4.1 Email
  • 6.4.2 TCP/IP
  • 6.5 Toward Commercialization
  • 6.6 The WWW
  • 6.7 Internet Governance
  • 6.7.1 IAB and IETF.
  • 6.7.2 ICANN Wars
  • 6.7.3 ISOC
  • 6.7.4 W3C
  • 6.7.5 A Final Example
  • 6.8 Analysis
  • 6.9 Exercises
  • References
  • Chapter 7 Cyber Threats
  • 7.1 Script Kiddies and Black-Hats
  • 7.1.1 Script-Kiddies
  • 7.1.2 Black-Hats
  • 7.1.3 Weaponized Exploits
  • 7.2 Tools of the Trade
  • 7.2.1 The First Exploit
  • 7.2.2 TCP/IP Flaws
  • 7.2.3 Open Ports
  • 7.2.4 Buffer Overflow Exploits
  • 7.2.5 DDoS Attacks
  • 7.2.6 E-mail Exploits
  • 7.2.7 Flawed Application and System Software
  • 7.3 Botnets
  • 7.4 Cyber Risk Analysis
  • 7.5 Cyber Infrastructure Risk
  • 7.5.1 Blocking Node Analysis
  • 7.6 Analysis
  • 7.7 Exercises
  • References
  • Chapter 8 Information Technology
  • 8.1 Principles of IT Security
  • 8.2 Enterprise Systems
  • 8.2.1 Loss of Service
  • 8.2.2 Loss of Data
  • 8.2.3 Loss of Security
  • 8.3 Cyber Defense
  • 8.3.1 Authenticate Users
  • 8.3.2 TP
  • 8.3.3 Inside the DMZ
  • 8.4 Basics of Encryption
  • 8.4.1 DES
  • 8.4.2 3DES
  • 8.4.3 AES
  • 8.5 Asymmetric Encryption
  • 8.5.1 Public Key Encryption
  • 8.6 RSA Illustrated
  • 8.7 PKI
  • 8.7.1 Definition of PKI
  • 8.7.2 Certificates
  • 8.8 Countermeasures
  • 8.9 Exercises
  • References
  • Chapter 9 Cybersecurity Policy
  • 9.1 A National Priority and a (Familiar) Call to Arms
  • 9.1.1 Infrastructure as Target: From Hypothetical Concern to a Growing Threat
  • 9.1.2 A Difficult Terrain: Convergence, Attribution, and the Production of Cyber Weapons
  • 9.2 Rewriting Cybersecurity Policy: The Difficulty of Reform
  • 9.2.1 A False Start: The Cybersecurity Act of 2012
  • 9.2.2 EO 13636: Improving Critical Infrastructure Cybersecurity
  • 9.2.3 The NIST Framework: The Peril and the Promise of Voluntary Standards
  • 9.2.4 ECS: The Possibilities and Limits of Information Sharing
  • 9.3 Cybersecurity, Critical Infrastructure, and Public Policy: An Ongoing-and Difficult-Evolution.
  • 9.3.1 Policy Options: Looking Forward
  • 9.4 Exercises
  • References
  • Chapter 10 Supervisory Control and Data Acquisition
  • 10.1 What Is SCADA?
  • 10.2 SCADA versus Enterprise Computing Differences
  • 10.3 Common Threats
  • 10.4 Who Is in Charge?
  • 10.5 SCADA Everywhere
  • 10.6 SCADA Risk Analysis
  • 10.7 San Francisco Public Utilities Commission SCADA Redundancy
  • 10.7.1 Redundancy as a Resiliency Mechanism
  • 10.7.2 Risk Reduction and Resource Allocation
  • 10.8 Analysis
  • 10.9 Exercises
  • Chapter 11 Water and Water Treatment
  • 11.1 From Germs to Terrorists
  • 11.1.1 SDWA
  • 11.1.2 The Water Information Sharing and Analysis Center
  • 11.2 Foundations: SDWA of 1974
  • 11.3 The Bioterrorism Act of 2002
  • 11.3.1 Is Water for Drinking?
  • 11.4 The Architecture of Water Systems
  • 11.4.1 The Law of the River
  • 11.5 The Hetch Hetchy Network
  • 11.5.1 Betweenness Analysis
  • 11.6 Cascade Analysis
  • 11.6.1 Multidimensional Analysis
  • 11.6.2 Blocking Nodes
  • 11.7 Hetch Hetchy Investment Strategies
  • 11.7.1 The Rational Actor Attacker
  • 11.8 Hetch Hetchy Threat Analysis
  • 11.8.1 Chem-Bio Threats
  • 11.8.2 Earthquake Threats
  • 11.8.3 Allocation to Harden Threat-Asset Pairs
  • 11.9 Analysis
  • 11.10 Exercises
  • References
  • Chapter 12 Energy
  • 12.1 Energy Fundamentals
  • 12.2 Regulatory Structure of the Energy Sector
  • 12.2.1 Evolution of Energy Regulation
  • 12.2.2 Other Regulation
  • 12.2.3 The Electric Sector ISAC
  • 12.3 Interdependent Coal
  • 12.3.1 Interdependency with Transportation
  • 12.4 The Rise of Oil and the Automobile
  • 12.4.1 Oil
  • 12.4.2 NG
  • 12.5 Energy Supply Chains
  • 12.5.1 Petroleum Administration for Defense Districts
  • 12.5.2 Refineries
  • 12.5.3 Transmission
  • 12.5.4 Transport4
  • 12.5.5 Storage
  • 12.5.6 NG Supply Chains
  • 12.5.7 SCADA
  • 12.6 The Critical Gulf of Mexico Cluster
  • 12.6.1 Refineries.
  • 12.6.2 Transmission Pipelines
  • 12.6.3 Storage
  • 12.7 Threat Analysis of the Gulf of Mexico Supply Chain
  • 12.8 Network Analysis of the Gulf of Mexico Supply Chain
  • 12.9 The KeystoneXL Pipeline Controversy
  • 12.10 The NG Supply Chain
  • 12.11 Analysis
  • 12.12 Exercises
  • References
  • Chapter 13 Electric Power
  • 13.1 The Grid
  • 13.2 From Death Rays to Vertical Integration
  • 13.2.1 Early Regulation
  • 13.2.2 Deregulation and EPACT 1992
  • 13.2.3 Energy Sector ISAC
  • 13.3 Out of Orders 888 and 889 Comes Chaos
  • 13.3.1 Economics versus Physics
  • 13.3.2 Betweenness Increases SOC
  • 13.4 The North American Grid
  • 13.4.1 ACE and Kirchhoff's Law
  • 13.5 Anatomy of a Blackout
  • 13.5.1 What Happened on August 14th, 2003
  • 13.6 Threat Analysis
  • 13.6.1 Attack Scenario 1: Disruption of Fuel Supply to Power Plants
  • 13.6.2 Attack Scenario 2: Destruction of Major Transformers
  • 13.6.3 Attack Scenario 3: Disruption of SCADA Communications
  • 13.6.4 Attack Scenario 4: Creation of a Cascading Transmission Failure
  • 13.7 Risk Analysis
  • 13.8 Analysis of WECC
  • 13.9 Analysis
  • 13.10 Exercises
  • References
  • Chapter 14 Healthcare and Public Health
  • 14.1 The Sector Plan
  • 14.2 Roemer's Model
  • 14.2.1 Components of Roemer's Model
  • 14.3 The Complexity of Public Health
  • 14.4 Risk Analysis of HPH Sector
  • 14.5 Bioterrorism
  • 14.5.1 Classification of Biological Agents
  • 14.6 Epidemiology
  • 14.6.1 The Kermack-McKendrick Model
  • 14.6.2 SARS
  • 14.7 Predicting Pandemics
  • 14.7.1 The Levy Flight Theory of Pandemics
  • 14.8 Biosurveillance
  • 14.8.1 Healthmap
  • 14.8.2 Big Data
  • 14.8.3 GeoSentinel
  • 14.9 Network Pandemics
  • 14.10 The World Travel Network
  • 14.11 Exercises
  • References
  • Chapter 15 Transportation
  • 15.1 Transportation under Transformation
  • 15.2 The Road to Prosperity
  • 15.2.1 Economic Impact
  • 15.2.2 The NHS.