Details

Critical Infrastructure Protection in Homeland Security


Critical Infrastructure Protection in Homeland Security

Defending a Networked Nation
3. Aufl.

von: Ted G. Lewis

104,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 26.11.2019
ISBN/EAN: 9781119614562
Sprache: englisch
Anzahl Seiten: 464

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>Covers critical infrastructure protection, providing a rigorous treatment of risk, resilience, complex adaptive systems, and sector dependence</b></p> <p>Wide in scope, this classroom-tested book is the only one to emphasize a scientific approach to protecting the key infrastructures components of a nation. It analyzes the complex network of entities that make up a nation's infrastructure, and identifies vulnerabilities and risks in various sectors by combining network science, complexity theory, risk analysis, and modeling and simulation. This approach reduces the complex problem of protecting water supplies, energy pipelines, telecommunication stations, power grid, and Internet and Web networks to a much simpler problem of protecting a few critical nodes.</p> <p>The new third edition of <i>Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation</i> incorporates a broader selection of ideas and sectors than the previous book. Divided into three sections, the first part looks at the historical origins of homeland security and critical infrastructure, and emphasizes current policy. The second examines theory and foundations, highlighting risk and resilience in the context of complexity theory, network science, and the prevailing theories of catastrophe. The last part covers the individual sectors, including communications, internet, cyber threats, information technology, social networks, SCADA, water and water treatment, energy, and more.</p> <ul> <li>Covers theories of catastrophes, details of how sectors work, and how to deal with the problem of critical infrastructure protection’s enormity and complexity</li> <li>Places great emphasis on computer security and whole-community response</li> <li>Includes PowerPoint slides for use by lecturers, as well as an instructor's guide with answers to exercises</li> <li>Offers five robust appendices that augment the non-mathematical chapters with more rigorous explanations and mathematics</li> </ul> <p><i>Critical Infrastructure Protection in Homeland Security, Third Edition</i> is an important book for upper-division undergraduates and first-year graduate students in political science, history, public administration, and computer technology. It will also be of great interest to professional security experts and policymakers.</p>
<p>Foreword By <i>Sen.</i> <i>Mark</i> <i>Warner</i> xv</p> <p>Foreword By <i>Prof.</i> <i>Andrew</i> <i>Odlyzko</i> xxi</p> <p>Preface xxxiii</p> <p>How to Use this Book xxxvii</p> <p>About the Companion Website xxxix</p> <p><b>1 Origins of Critical Infrastructure Protection 1</b></p> <p>1.1 Recognition 3</p> <p>1.2 Natural Disaster Recovery 4</p> <p>1.3 Definitional Phase 5</p> <p>1.4 Public–Private Cooperation 8</p> <p>1.5 Federalism: Whole of Government 8</p> <p>1.6 Rise of the Framework 10</p> <p>1.7 Implementing a Risk Strategy 12</p> <p>1.7.1 Risk‐Informed Decision‐Making 13</p> <p>1.7.2 Resilience‐Informed Decision‐Making 14</p> <p>1.7.3 Prevention or Response? 15</p> <p>1.8 Analysis 16</p> <p>1.8.1 The Public–Private Partnership (PPP) Conundrum 17</p> <p>1.8.2 The Information Sharing Conundrum 17</p> <p>1.8.3 Climate Change Conundrum 17</p> <p>1.8.4 The Funding Conundrum 17</p> <p>1.8.5 Spend 80% on 20% of the Country 18</p> <p>1.9 Exercises 18</p> <p>1.10 Discussions 19</p> <p>References 20</p> <p><b>2 Risk Strategies 21</b></p> <p>2.1 Expected Utility Theory 23</p> <p>2.1.1 Threat–Asset Pairs 24</p> <p>2.2 PRA and Fault Trees 24</p> <p>2.2.1 An Example: Your Car 26</p> <p>2.3 MRBA and Resource Allocation 26</p> <p>2.3.1 Another Example: Redundant Power 27</p> <p>2.4 Cyber Kill Chains are Fault Trees 28</p> <p>2.5 PRA in the Supply Chain 29</p> <p>2.6 Protection Versus Response 30</p> <p>2.7 Threat is an Output 32</p> <p>2.8 Bayesian Belief Networks 33</p> <p>2.8.1 A Bayesian Network for Threat 33</p> <p>2.8.2 Predictive Analytics 34</p> <p>2.9 Risk of a Natural Disaster 35</p> <p>2.9.1 Exceedence 35</p> <p>2.9.2 EP vs. PML Risk 35</p> <p>2.10 Earthquakes 36</p> <p>2.11 Black Swans and Risk 36</p> <p>2.12 Black Swan Floods 37</p> <p>2.13 Are Natural Disasters Getting Worse? 38</p> <p>2.14 Black Swan Al Qaeda Attacks 38</p> <p>2.15 Black Swan Pandemic 39</p> <p>2.16 Risk and Resilience 41</p> <p>2.17 Exercises 42</p> <p>2.18 Discussions 43</p> <p>References 43</p> <p><b>3 Theories of Catastrophe 44</b></p> <p>3.1 Normal Accident Theory (NAT) 45</p> <p>3.2 Blocks and Springs 46</p> <p>3.3 Bak’s Punctuated Equilibrium Theory 48</p> <p>3.4 Tragedy of the Commons (TOC) 51</p> <p>3.4.1 The State Space Diagram 52</p> <p>3.5 The US Electric Power Grid 52</p> <p>3.6 Paradox of Enrichment (POE) 55</p> <p>3.6.1 The Great Recessions 56</p> <p>3.6.2 Too Much Money 56</p> <p>3.7 Competitive Exclusion Principle (CEP) 57</p> <p>3.7.1 Gause’s Law 58</p> <p>3.7.2 The Self‐Organizing Internet 58</p> <p>3.7.3 A Monoculture 59</p> <p>3.8 Paradox of Redundancy (POR) 59</p> <p>3.9 Resilience of Complex Infrastructure Systems 60</p> <p>3.9.1 Expected Utility and Risk 60</p> <p>3.9.2 Countering SOC 60</p> <p>3.9.3 The TOC Test 61</p> <p>3.9.4 POE and Nonlinearity 61</p> <p>3.9.5 CEP and Loss of Redundancy 61</p> <p>3.9.6 POR and Percolation 62</p> <p>3.10 Emergence 62</p> <p>3.10.1 Opposing Forces in Emergent CIKR 62</p> <p>3.11 Exercises 63</p> <p>3.12 Discussions 64</p> <p>References 64</p> <p><b>4 Complex CIKR Systems 66</b></p> <p>4.1 CIKR as Networks 69</p> <p>4.1.1 Emergence 72</p> <p>4.1.2 Classes of CIKR Networks 74</p> <p>4.1.3 Self‐Organized Networks 75</p> <p>4.2 Cascading CIKR Systems 76</p> <p>4.2.1 The Fundamental Resilience Line 80</p> <p>4.2.2 Critical Factors and Cascades 81</p> <p>4.2.3 Targeted Attacks 82</p> <p>4.3 Network Flow Risk and Resilience 85</p> <p>4.3.1 Braess’s Paradox 86</p> <p>4.3.2 Flow Network Resilience 87</p> <p>4.4 Paradox of Redundancy 88</p> <p>4.4.1 Link Percolation and Robustness 88</p> <p>4.4.2 Node Percolation and Robustness 89</p> <p>4.4.3 Blocking Nodes 89</p> <p>4.5 Network Risk 91</p> <p>4.5.1 Crude Oil and Keystone XL 92</p> <p>4.5.2 MBRA Network Resource Allocation 92</p> <p>4.6 The Fragility Framework 96</p> <p>4.6.1 The Hodges Fragility Framework 96</p> <p>4.6.2 The Hodges Fault Tree 97</p> <p>4.7 Exercises 98</p> <p>4.8 Discussions 99</p> <p>References 100</p> <p><b>5 Communications 101</b></p> <p>5.1 Early Years 102</p> <p>5.2 Regulatory Structure 105</p> <p>5.3 The Architecture of the Communications Sector 106</p> <p>5.3.1 Physical Infrastructure 107</p> <p>5.3.2 Wireless Networks 108</p> <p>5.3.3 Extraterrestrial Communication 108</p> <p>5.3.4 Land Earth Stations 109</p> <p>5.3.5 Cellular Networks 110</p> <p>5.3.6 Generations 110</p> <p>5.3.7 Wi‐Fi Technology 111</p> <p>5.4 Risk and Resilience Analysis 111</p> <p>5.4.1 Importance of Carrier Hotels 113</p> <p>5.4.2 Network Analysis 114</p> <p>5.4.3 Flow Analysis 116</p> <p>5.4.4 Robustness 116</p> <p>5.4.5 The Submarine Cable Network 117</p> <p>5.4.6 HPM Attacks 117</p> <p>5.5 Cellular Network Threats 118</p> <p>5.5.1 Cyber Threats 119</p> <p>5.5.2 HPM‐Like Threats 120</p> <p>5.5.3 Physical Threats 120</p> <p>5.6 Analysis 120</p> <p>5.7 Exercises 121</p> <p>5.8 Discussions 122</p> <p>References 122</p> <p><b>6 Internet 123</b></p> <p>6.1 The Internet Monoculture 125</p> <p>6.1.1 The Original Sin 127</p> <p>6.1.2 How TCP/IP Works 128</p> <p>6.1.3 More Original Sin 130</p> <p>6.2 Analyzing The Autonomous System Network 130</p> <p>6.2.1 The AS500 Network 130</p> <p>6.2.2 Countermeasures 132</p> <p>6.3 The RFC Process 133</p> <p>6.3.1 Emergence of Email 133</p> <p>6.3.2 Emergence of TCP/IP 133</p> <p>6.4 The Internet of Things (IOT) 134</p> <p>6.4.1 Data Scraping 135</p> <p>6.4.2 IoT Devices 135</p> <p>6.4.3 More IoT Exploits 136</p> <p>6.5 Commercialization 137</p> <p>6.6 The World Wide Web 137</p> <p>6.7 Internet Governance 138</p> <p>6.7.1 IAB and IETF 138</p> <p>6.7.2 ICANN Wars 140</p> <p>6.7.3 ISOC 141</p> <p>6.7.4 W3C 141</p> <p>6.8 Internationalization 142</p> <p>6.9 Regulation and Balkanization 142</p> <p>6.10 Exercises 143</p> <p>6.11 Discussions 144</p> <p><b>7 Cyber Threats 145</b></p> <p>7.1 Threat Surface 146</p> <p>7.1.1 Script Kiddies 148</p> <p>7.1.2 Black‐Hats 149</p> <p>7.1.3 Weaponized Exploits 149</p> <p>7.1.4 Ransomware and the NSA 150</p> <p>7.2 Basic Vulnerabilities 151</p> <p>7.2.1 The First Exploit 152</p> <p>7.2.2 TCP/IP Flaws 153</p> <p>7.2.3 Open Ports 154</p> <p>7.2.4 Buffer Overflow Exploits 155</p> <p>7.2.5 DDoS Attacks 155</p> <p>7.2.6 Email Exploits 156</p> <p>7.2.7 Flawed Application and System Software 157</p> <p>7.2.8 Trojans, Worms, Viruses, and Keyloggers 158</p> <p>7.2.9 Hacking the DNS 159</p> <p>7.3 Botnets 159</p> <p>7.3.1 Hardware Flaws 160</p> <p>7.4 Cyber Risk Analysis 161</p> <p>7.5 Cyber Infrastructure Risk 161</p> <p>7.5.1 Blocking Node Analysis 163</p> <p>7.5.2 Machine Learning Approach 165</p> <p>7.5.3 Kill Chain Approach 165</p> <p>7.6 Analysis 166</p> <p>7.7 Exercises 166</p> <p>7.8 Discussions 168</p> <p>References 168</p> <p><b>8 Information Technology (IT) 169</b></p> <p>8.1 Principles of IT Security 171</p> <p>8.2 Enterprise Systems 171</p> <p>8.2.1 Loss of Service 172</p> <p>8.2.2 Loss of Data 172</p> <p>8.2.3 Loss of Security 172</p> <p>8.3 Cyber Defense 173</p> <p>8.3.1 Authenticate Users 173</p> <p>8.3.2 Trusted Path 174</p> <p>8.3.3 Inside the DMZ 175</p> <p>8.4 Basics of Encryption 176</p> <p>8.4.1 DES 177</p> <p>8.4.2 3DES 177</p> <p>8.4.3 AES 177</p> <p>8.5 Asymmetric Encryption 177</p> <p>8.5.1 Public Key Encryption 179</p> <p>8.5.2 RSA Illustrated 180</p> <p>8.5.3 Shor’s Algorithm 180</p> <p>8.6 PKI 181</p> <p>8.6.1 Definition of PKI 182</p> <p>8.6.2 Certificates 182</p> <p>8.6.3 Blockchain 183</p> <p>8.6.4 FIDO and WebAuth 184</p> <p>8.6.5 Mathematics of Passwords 184</p> <p>8.7 Countermeasures 185</p> <p>8.8 Exercises 187</p> <p>8.9 Discussions 188</p> <p>References 188</p> <p><b>9 Hacking Social Networks 189</b></p> <p>9.1 Web 2.0 and the Social Network 190</p> <p>9.2 Social Networks Amplify Memes 193</p> <p>9.3 Topology Matters 194</p> <p>9.4 Computational Propaganda 194</p> <p>9.5 The ECHO Chamber 197</p> <p>9.6 Big Data Analytics 198</p> <p>9.6.1 Algorithmic Bias 199</p> <p>9.6.2 The Depths of Deep Learning 200</p> <p>9.6.3 Data Brokers 200</p> <p>9.7 GDPR 201</p> <p>9.8 Social Network Resilience 202</p> <p>9.9 The Regulated Web 203</p> <p>9.9.1 The Century of Regulation 203</p> <p>9.10 Exercises 204</p> <p>9.11 Discussions 205</p> <p>References 206</p> <p><b>10 Supervisory Control and Data Acquisition 207</b></p> <p>10.1 What is SCADA? 208</p> <p>10.2 SCADA Versus Enterprise Computing Differences 209</p> <p>10.3 Common Threats 210</p> <p>10.4 Who is in Charge? 211</p> <p>10.5 SCADA Everywhere 212</p> <p>10.6 SCADA Risk Analysis 213</p> <p>10.7 NIST‐CSF 216</p> <p>10.8 SFPUC SCADA Redundancy 216</p> <p>10.8.1 Redundancy as a Resiliency Mechanism 218</p> <p>10.8.2 Risk Reduction and Resource Allocation 220</p> <p>10.9 Industrial Control of Power Plants 221</p> <p>10.9.1 Maximum PML 221</p> <p>10.9.2 Recovery 221</p> <p>10.9.3 Node Resilience 222</p> <p>10.10 Analysis 225</p> <p>10.11 Exercises 227</p> <p>10.12 Discussions 228</p> <p><b>11 Water and Water Treatment 229</b></p> <p>11.1 From Germs to Terrorists 230</p> <p>11.1.1 Safe Drinking Water Act 231</p> <p>11.1.2 The WaterISAC 231</p> <p>11.2 Foundations: SDWA of 1974 232</p> <p>11.3 The Bioterrorism Act of 2002 232</p> <p>11.3.1 Is Water for Drinking? 233</p> <p>11.3.2 Climate Change and Rot: The New Threats 234</p> <p>11.4 The Architecture of Water Systems 235</p> <p>11.4.1 The Law of The River 235</p> <p>11.5 The Hetch Hetchy Network 235</p> <p>11.5.1 Bottleneck Analysis 236</p> <p>11.6 Risk Analysis 238</p> <p>11.6.1 Multidimensional Analysis 238</p> <p>11.6.2 Blocking Nodes 239</p> <p>11.7 Hetch Hetchy Investment Strategies 239</p> <p>11.7.1 The Rational Actor Attacker 240</p> <p>11.8 Hetch Hetchy Threat Analysis 242</p> <p>11.8.1 Chem/Bio Threats 242</p> <p>11.8.2 Earthquake Threats 244</p> <p>11.8.3 Allocation to Harden Threat–Asset Pairs 244</p> <p>11.9 Analysis 245</p> <p>11.10 Exercises 246</p> <p>11.11 Discussions 247</p> <p>References 248</p> <p><b>12 Energy 249</b></p> <p>12.1 Energy Fundamentals 251</p> <p>12.2 Regulatory Structure of the Energy Sector 252</p> <p>12.2.1 Evolution of Energy Regulation 252</p> <p>12.2.2 Other Regulations 253</p> <p>12.2.3 The Energy ISAC 254</p> <p>12.3 Interdependent Coal 254</p> <p>12.3.1 Interdependency with Transportation 254</p> <p>12.4 The Rise of Oil and the Automobile 255</p> <p>12.4.1 Oil 255</p> <p>12.4.2 Natural Gas 256</p> <p>12.5 Energy Supply Chains 256</p> <p>12.5.1 PADDs 257</p> <p>12.5.2 Refineries 258</p> <p>12.5.3 Transmission 258</p> <p>12.5.4 Transport4 259</p> <p>12.5.5 Storage 259</p> <p>12.5.6 Natural Gas Supply Chains 259</p> <p>12.5.7 SCADA 259</p> <p>12.6 The Critical Gulf of Mexico Cluster 259</p> <p>12.6.1 Refineries 260</p> <p>12.6.2 Transmission Pipelines 260</p> <p>12.6.3 Storage 262</p> <p>12.7 Threat Analysis of the Gulf of Mexico Supply Chain 265</p> <p>12.8 Network Analysis of the Gulf of Mexico Supply Chain 266</p> <p>12.9 The Keystonexl Pipeline Controversy 267</p> <p>12.10 The Natural Gas Supply Chain 268</p> <p>12.11 Analysis 270</p> <p>12.12 Exercises 270</p> <p>12.13 Discussions 271</p> <p>References 272</p> <p><b>13 Electric Power 273</b></p> <p>13.1 The Grid 274</p> <p>13.2 From Death Rays to Vertical Integration 275</p> <p>13.2.1 Early Regulation 276</p> <p>13.2.2 Deregulation and EPACT 1992 278</p> <p>13.2.3 Energy Sector ISAC 278</p> <p>13.3 Out of Orders 888 and 889 Comes Chaos 279</p> <p>13.3.1 Economics Versus Physics 280</p> <p>13.3.2 Betweenness Increases SOC 281</p> <p>13.4 The North American Grid 281</p> <p>13.4.1 ACE and Kirchhoff’s Law 283</p> <p>13.5 Anatomy of a Blackout 283</p> <p>13.5.1 What Happened on August 14 285</p> <p>13.6 Threat Analysis 286</p> <p>13.6.1 Attack Scenario 1: Disruption of Fuel Supply to Power Plants 286</p> <p>13.6.2 Attack Scenario 2: Destruction of Major Transformers 287</p> <p>13.6.3 Attack Scenario 3: Disruption of SCADA Communications 287</p> <p>13.6.4 Attack Scenario 4: Creation of a Cascading Transmission Failure 287</p> <p>13.7 Risk Analysis 288</p> <p>13.8 Analysis of WECC96 288</p> <p>13.9 Analysis 291</p> <p>13.10 Exercises 292</p> <p>13.11 Discussions 294</p> <p>References 294</p> <p><b>14 Healthcare and Public Health 295</b></p> <p>14.1 The Sector Plan 296</p> <p>14.2 Roemer’s Model 297</p> <p>14.2.1 Components of Roemer’s Model 298</p> <p>14.3 The Complexity of Public Health 299</p> <p>14.4 Risk Analysis of HPH Sector 300</p> <p>14.5 Bioterrorism 300</p> <p>14.5.1 Classification of Biological Agents 301</p> <p>14.6 Epidemiology 303</p> <p>14.6.1 The Kermack–McKendrick Model 303</p> <p>14.6.2 SARS 304</p> <p>14.7 Predicting Pandemics 304</p> <p>14.7.1 The Levy Flight Theory of Pandemics 306</p> <p>14.8 Bio‐Surveillance 307</p> <p>14.8.1 HealthMap 307</p> <p>14.8.2 Big Data 307</p> <p>14.8.3 GeoSentinel 308</p> <p>14.9 Network Pandemics 309</p> <p>14.10 The World Travel Network 310</p> <p>14.11 Exercises 312</p> <p>14.12 Discussions 313</p> <p>References 313</p> <p><b>15 Transportation 314</b></p> <p>15.1 Transportation Under Transformation 316</p> <p>15.2 The Road to Prosperity 319</p> <p>15.2.1 Economic Impact 319</p> <p>15.2.2 The National Highway System (NHS) 319</p> <p>15.2.3 The Interstate Highway Network Is Resilient 320</p> <p>15.2.4 The NHS Is Safer 320</p> <p>15.3 Rail 320</p> <p>15.3.1 Birth of Regulation 322</p> <p>15.3.2 Freight Trains 323</p> <p>15.3.3 Passenger Rail 324</p> <p>15.3.4 Commuter Rail Resiliency 324</p> <p>15.4 Air 325</p> <p>15.4.1 Resilience of the Hub‐and‐Spoke Network 326</p> <p>15.4.2 Security of Commercial Air Travel 328</p> <p>15.4.3 How Safe and Secure Is Flying in the United States? 329</p> <p>15.5 Airport Games 330</p> <p>15.5.1 GUARDS 330</p> <p>15.5.2 Bayesian Belief Networks 331</p> <p>15.6 Exercises 331</p> <p>15.7 Discussions 332</p> <p>References 332</p> <p><b>16 Supply Chains 334</b></p> <p>16.1 The World Is Flat, But Tilted 335</p> <p>16.1.1 Supply‐Side Supply 336</p> <p>16.1.2 The Father of Containerization 337</p> <p>16.1.3 The Perils of Efficient Supply Chains 337</p> <p>16.2 The World Trade Web 340</p> <p>16.2.1 Economic Contagions 342</p> <p>16.3 Risk Assessment 344</p> <p>16.3.1 MSRAM 344</p> <p>16.3.2 PROTECT 345</p> <p>16.4 Analysis 346</p> <p>16.5 Exercises 347</p> <p>16.6 Discussions 347</p> <p>References 348</p> <p><b>17 Banking and Finance 349</b></p> <p>17.1 The Financial System 351</p> <p>17.1.1 Federal Reserve vs. US Treasury 352</p> <p>17.1.2 Operating the System 353</p> <p>17.1.3 Balancing the Balance Sheet 353</p> <p>17.1.4 Paradox of Enrichment 354</p> <p>17.2 Financial Networks 355</p> <p>17.2.1 FedWire 355</p> <p>17.2.2 TARGET 356</p> <p>17.2.3 SWIFT 356</p> <p>17.2.4 Credit Card Networks 356</p> <p>17.2.5 3‐D Secure Payment 357</p> <p>17.3 Virtual Currency 358</p> <p>17.3.1 Intermediary PayPal 358</p> <p>17.3.2 ApplePay 358</p> <p>17.3.3 Cryptocurrency 359</p> <p>17.4 Hacking The Financial Network 361</p> <p>17.5 Hot Money 363</p> <p>17.5.1 The Dutch Disease 364</p> <p>17.6 The End of Stimulus? 364</p> <p>17.7 Fractal Markets 365</p> <p>17.7.1 Efficient Market Hypothesis (EMH) 366</p> <p>17.7.2 Fractal Market Hypothesis (FMH) 366</p> <p>17.7.3 Predicting Collapse 367</p> <p>17.8 Exercises 369</p> <p>17.9 Discussions 370</p> <p>References 370</p> <p><b>18 Strategies for a Networked Nation 371</b></p> <p>18.1 Whole of Government 372</p> <p>18.2 Risk and Resilience 373</p> <p>18.3 Complex and Emergent CIKR 373</p> <p>18.4 Communications and the Internet 374</p> <p>18.5 Information Technology (IT) 375</p> <p>18.6 Surveillance Capitalism 375</p> <p>18.7 Industrial Control Systems 376</p> <p>18.8 Energy and Power 376</p> <p>18.9 Global Pandemics 377</p> <p>18.10 Transportation and Supply Chains 377</p> <p>18.11 Banking and Finance 378</p> <p>18.12 Discussions 378</p> <p><b>Appendix A: Math: Probability Primer 379</b></p> <p>A.1 A Priori Probability 379</p> <p>A.2 A Pori Probability 381</p> <p>A.3 Random Networks 382</p> <p>A.4 Conditional Probability 383</p> <p>A.5 Bayesian Networks 384</p> <p>A.6 Bayesian Reasoning 385</p> <p>References 387</p> <p>Further Reading 388</p> <p><b>Appendix B: Math: Risk and Resilience 389</b></p> <p>B.1 Expected Utility Theory 390</p> <p>B.1.1 Fault Trees 390</p> <p>B.1.2 Fault Tree Minimization 391</p> <p>B.1.3 XOR Fault Tree Allocation Algorithm 392</p> <p>B.2 Bayesian Estimation 392</p> <p>B.2.1 Bayesian Networks 392</p> <p>B.3 Exceedence and PML Risk 394</p> <p>B.3.1 Modeling EP 394</p> <p>B.3.2 Estimating EP From Data 395</p> <p>B.3.3 How to Process Time‐Series Data 396</p> <p>B.4 Network Risk 397</p> <p>B.5 Model‐Based Risk Analysis (MBRA) 398</p> <p>B.5.1 Network Resource Allocation 401</p> <p>B.5.2 Simulation 402</p> <p>B.5.3 Cascade Risk 402</p> <p>B.5.4 Flow Risk 402</p> <p>References 403</p> <p><b>Appendix C: Math: Spectral Radius 404</b></p> <p>C.1 Network as Matrix 404</p> <p>C.2 Matrix Diagonalization 404</p> <p>C.3 Relationship to Risk and Resilience 406</p> <p>C.3.1 Equation 1 406</p> <p>C.3.2 Equation 2 407</p> <p>Reference 407</p> <p><b>Appendix D: Math: Tragedy of the Commons 408</b></p> <p>D.1 Lotka–Volterra Model 408</p> <p>D.2 Hopf–Holling Model 408</p> <p><b>Appendix E: Math: The DES and RSA Algorithm 410</b></p> <p>E.1 DES Encryption 410</p> <p>E.2 RSA Encryption 410</p> <p><b>Appendix F: Glossary 412</b></p> <p>Index 414</p>
<p><b>Ted G. Lewis</b> has over 35 published books to his credit, and extensive experience in both industry and academia. He served as a senior executive in DaimlerChrysler Corp, Eastman Kodak Company, and Oregon Advanced Computing Institute, as well as a professor of computer science at the University of Missouri-Rolla, University of Louisiana, Oregon State University, and the Naval Postgraduate School. Lewis was Editor-in-Chief of <i>IEEE Software Magazine, IEEE Computer Magazine,</i> and founded several of its periodicals.
<p><b>COVERS CRITICAL INFRASTRUCTURE PROTECTION, PROVIDING A RIGOROUS TREATMENT OF RISK, RESILIENCE, COMPLEX ADAPTIVE SYSTEMS, AND SECTOR DEPENDENCE</b> <p>Wide in scope, this classroom-tested book is the only one to emphasize a scientific approach to protecting the key infrastructures components of a nation. It analyzes the complex network of entities that make up a nation's infrastructure, and identifies vulnerabilities and risks in various sectors by combining network science, complexity theory, risk analysis, and modeling and simulation. This approach reduces the complex problem of protecting water supplies, energy pipelines, telecommunication stations, power grid, and Internet and Web networks to a much simpler problem of protecting a few critical nodes. <p>The new third edition of <i>Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation</i> incorporates a broader selection of ideas and sectors than the previous book. Divided into three sections, the first part looks at the historical origins of homeland security and critical infrastructure, and emphasizes current policy. The second examines theory and foundations, highlighting risk and resilience in the context of complexity theory, network science, and the prevailing theories of catastrophe. The last part covers the individual sectors, including communications, internet, cyber threats, information technology, social networks, SCADA, water and water treatment, energy, and more. <p>This important guide also reviews leadership standards within the organizational structure, warning signs of cultural degradation and remedies, as well as the importance of using diverse methods over time to assess culture. This vital resource: <ul> <li>Covers theories of catastrophes, details of how sectors work, and how to deal with the problem of critical infrastructure protection's enormity and complexity</li> <li>Places great emphasis on computer security and whole-community response</li> <li>Includes PowerPoint slides for use by lecturers, as well as an instructor's guide with answers to exercises</li> <li>Offers five robust appendices that augment the non-mathematical chapters with more rigorous explanations and mathematics</li> </ul> <p><i>Critical Infrastructure Protection in Homeland Security, Third Edition</i> is an important book for upper-division undergraduates and first-year graduate students in political science, history, public administration, and computer technology. It will also be of great interest to professional security experts and policymakers.

Diese Produkte könnten Sie auch interessieren:

Projektmanagement und Prozessmessung
Projektmanagement und Prozessmessung
von: Ernst Jankulik, Peter Kuhlang, Roland Piff
PDF ebook
51,99 €
Project Management
Project Management
von: Harold Kerzner
PDF ebook
71,99 €