Cargando…

National infrastructure : protecting, funding and rebuilding /

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Lupul, Frederick H.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: New York, N.Y. : Nova Science Publishers, Inc, ©2009.
Colección:Terrorism, hot spots and conflict-related issues.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • 1.3.2. The Value Proposition1.4. THREATS TO THE NATION'S CI/KR; 1.4.1. The Vulnerability of the U.S. Infrastructureto 21st Century Threats; 1.4.2. The Nature of Possible Terrorist Attacks; 1.5. ALL-HAZARDS AND CI/KR PROTECTION; 1.6. PLANNING ASSUMPTIONS; 1.6.1. Sector-Specific Nature of CI/KR Protection; 1.6.2. Cross-Sector Dependencies and Interdependencies; 1.6.3. Adaptive Nature of the Terrorist Threat; 1.6.4. All-Hazards Nature of CI/KR Protection; 1.7. SPECIAL CONSIDERATIONS; 1.7.1 Protection of Sensitive Information; 1.7.2. The Cyber Dimension; 1.7.3. The Human Element.
  • 1.7.4. International CI/KR Protection1.8. ACHIEVING THE GOAL OF THE NIPP; 1.8.1. Understanding and Sharing Information; 1.8.2. Building Security Partnerships; 1.8.3. Implementing a Long-Term CI/KR Risk Management Program; 1.8.4. Maximizing Efficient Use of Resources for CI/KR Protection; 2. AUTHORITIES, ROLES, ANDRESPONSIBILITIES; 2.1. AUTHORITIES; 2.2. ROLES AND RESPONSIBILITIES; 2.2.1. Department of Homeland Security; 2.2.2. Sector-Specific Agencies; 2.2.3. Other Federal Departments, Agencies, and Offices; 2.2.4. State, Local, and Tribal Governments.
  • 2.2.5. Private Sector Owners and Operators2.2.6. Advisory Councils; 2.2.7. Academia and Research Centers; 3. THE PROTECTION PROGRAM STRATEGY:MANAGING RISK; 3.1. SET SECURITY GOALS; 3.2. IDENTIFY ASSETS, SYSTEMS, NETWORKS, AND FUNCTIONS; 3.2.1. National Infrastructure Inventory; 3.2.2. Protecting and Accessing Inventory Information; 3.2.3. SSA Roles in Inventory Development and Maintenance; 3.2.4. State Roles in Inventory Development and Maintenance; 3.2.5. Identifying Cyber Infrastructure; 3.2.6. Identifying Positioning, Navigation, and Timing Services; 3.3. ASSESS RISKS.
  • 3.3.1. NIPP Baseline Criteria for Assessment Methodologies3.3.2. Consequence Analysis; 3.3.3. Vulnerability Assessment; 3.3.4. Threat Analysis; 3.4. PRIORITIZE; 3.4.1. The Prioritization Process; 3.4.2. Tailoring Prioritization Approaches to Sector Needs; 3.4.3. The Uses of Prioritization; 3.5. IMPLEMENT PROTECTIVE PROGRAMS; 3.5.1. Protective Actions; 3.5.2. Characteristics of Effective Protective Programs; 3.5.3. Protective Programs, Initiatives, and Reports; 3.6. MEASURE EFFECTIVENESS; 3.6.1. NIPP Metrics and Measures; 3.6.2. Gathering Performance Information.