Communications sector protection and homeland security : communications sector protection and homeland security /
"The tenth of a new, well-received, and highly acclaimed series on critical infrastructure and homeland security, Communications Sector Protection and Homeland Security is an eye-opening account and an important reference source of a complex sector"--Provided by publisher.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Lanham, Maryland :
Bernan Press, an imprint of The Rowman & Littlefield Publishing Group, Inc.,
[2018]
|
Colección: | Homeland security series (Lanham, Md.)
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Machine generated contents note: 1. Introduction
- We Feel It Because of a Need; It Is the Need to Communicate
- Sector Overview
- The Bottom Line
- References and Recommended Reading
- 2. Terrorist Attacks Against Americans
- Introduction
- What Is Terrorism?
- References and Recommended Reading
- 3. Critical Infrastructure
- What Is Critical Infrastructure?
- Wireline Infrastructure
- Wireless Infrastructure
- Satellite Infrastructure
- Cable Infrastructure
- Broadcasting Infrastructure
- The Bottom Line
- References and Recommended Reading
- 4. Communications Sector Security
- Mr. Grasshopper and Mr. Rabbit #1
- Introduction
- Communications Sector Security Goals and Attributes
- Homeland Security Directives
- Assessing Consequences
- References and Recommended Reading
- 5. Vulnerability Assessment (VA)
- Introduction
- Assessing Vulnerabilities
- Mr. Grasshopper and Mr. Rabbit Conversation #2
- Insider Threat Vulnerability
- Vulnerability Assessment (VA)
- Vulnerability Assessment Methodology
- Vulnerability Assessment Procedures
- Vulnerability Assessment: Checklist Procedure
- References and Recommended Reading
- 6. Preparation: When Is Enough, Enough?
- Introduction
- Threats and Incidents
- Response to Threats
- Preparation
- The Bottom Line
- References and Recommended Reading
- 7. Cybersecurity and SCADA
- Cyberspace
- What Is SCADA?
- SCADA Applications
- SCADA Vulnerabilities
- Steps to Improve SCADA Security
- References and Recommended Reading
- 8. Emergency Response
- Communications Sector Contingency Planning
- Crisis Communications Plan
- The Bottom Line
- References and Recommended Reading
- 9. Security Techniques and Hardware
- The Multiple-Barrier Approach
- Security Hardware Devices
- Communication Integration
- Cyber Protection Devices
- References and Recommended Reading
- 10. The Paradigm Shift
- Fourteen Features of Active and Effective Security
- References and Recommended Reading.