Cargando…

Communications sector protection and homeland security : communications sector protection and homeland security /

"The tenth of a new, well-received, and highly acclaimed series on critical infrastructure and homeland security, Communications Sector Protection and Homeland Security is an eye-opening account and an important reference source of a complex sector"--Provided by publisher.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Spellman, Frank R. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Lanham, Maryland : Bernan Press, an imprint of The Rowman & Littlefield Publishing Group, Inc., [2018]
Colección:Homeland security series (Lanham, Md.)
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Machine generated contents note: 1. Introduction
  • We Feel It Because of a Need; It Is the Need to Communicate
  • Sector Overview
  • The Bottom Line
  • References and Recommended Reading
  • 2. Terrorist Attacks Against Americans
  • Introduction
  • What Is Terrorism?
  • References and Recommended Reading
  • 3. Critical Infrastructure
  • What Is Critical Infrastructure?
  • Wireline Infrastructure
  • Wireless Infrastructure
  • Satellite Infrastructure
  • Cable Infrastructure
  • Broadcasting Infrastructure
  • The Bottom Line
  • References and Recommended Reading
  • 4. Communications Sector Security
  • Mr. Grasshopper and Mr. Rabbit #1
  • Introduction
  • Communications Sector Security Goals and Attributes
  • Homeland Security Directives
  • Assessing Consequences
  • References and Recommended Reading
  • 5. Vulnerability Assessment (VA)
  • Introduction
  • Assessing Vulnerabilities
  • Mr. Grasshopper and Mr. Rabbit Conversation #2
  • Insider Threat Vulnerability
  • Vulnerability Assessment (VA)
  • Vulnerability Assessment Methodology
  • Vulnerability Assessment Procedures
  • Vulnerability Assessment: Checklist Procedure
  • References and Recommended Reading
  • 6. Preparation: When Is Enough, Enough?
  • Introduction
  • Threats and Incidents
  • Response to Threats
  • Preparation
  • The Bottom Line
  • References and Recommended Reading
  • 7. Cybersecurity and SCADA
  • Cyberspace
  • What Is SCADA?
  • SCADA Applications
  • SCADA Vulnerabilities
  • Steps to Improve SCADA Security
  • References and Recommended Reading
  • 8. Emergency Response
  • Communications Sector Contingency Planning
  • Crisis Communications Plan
  • The Bottom Line
  • References and Recommended Reading
  • 9. Security Techniques and Hardware
  • The Multiple-Barrier Approach
  • Security Hardware Devices
  • Communication Integration
  • Cyber Protection Devices
  • References and Recommended Reading
  • 10. The Paradigm Shift
  • Fourteen Features of Active and Effective Security
  • References and Recommended Reading.