Critical Infrastructure System Security and Resiliency

Book description

Security protections for critical infrastructure nodes are intended to minimize the risks resulting from an initiating event, whether it is an intentional malevolent act or a natural hazard. With an emphasis on protecting an infrastructure's ability to perform its mission or function, Critical Infrastructure System Security and Resiliency presents

Table of contents

  1. Front Cover (1/2)
  2. Front Cover (2/2)
  3. Contents (1/2)
  4. Contents (2/2)
  5. List of Figures
  6. List of Tables
  7. Foreword
  8. Acknowledgments
  9. About the Authors
  10. Acronyms and Abbreviations
  11. Chapter 1 - Introduction to Security Risk Assessment (1/2)
  12. Chapter 1 - Introduction to Security Risk Assessment (2/2)
  13. Chapter 2 - Undesired Events, Associated Critical Assets, and Available Resources (1/2)
  14. Chapter 2 - Undesired Events, Associated Critical Assets, and Available Resources (2/2)
  15. Chapter 3 - Threat Analysis (1/3)
  16. Chapter 3 - Threat Analysis (2/3)
  17. Chapter 3 - Threat Analysis (3/3)
  18. Chapter 4 - Likelihood of Initiating Events (1/2)
  19. Chapter 4 - Likelihood of Initiating Events (2/2)
  20. Chapter 5 - Assess Consequences and Responses for Undesired Event
  21. Chapter 6 - Assessment of Protection System Effectiveness (1/4)
  22. Chapter 6 - Assessment of Protection System Effectiveness (2/4)
  23. Chapter 6 - Assessment of Protection System Effectiveness (3/4)
  24. Chapter 6 - Assessment of Protection System Effectiveness (4/4)
  25. Chapter 7 - Estimate Security Risk (1/3)
  26. Chapter 7 - Estimate Security Risk (2/3)
  27. Chapter 7 - Estimate Security Risk (3/3)
  28. Chapter 8 - Motivating Infrastructure Resilience Analysis
  29. Chapter 9 - Current State of Resilience Assessment (1/6)
  30. Chapter 9 - Current State of Resilience Assessment (2/6)
  31. Chapter 9 - Current State of Resilience Assessment (3/6)
  32. Chapter 9 - Current State of Resilience Assessment (4/6)
  33. Chapter 9 - Current State of Resilience Assessment (5/6)
  34. Chapter 9 - Current State of Resilience Assessment (6/6)
  35. Chapter 10 - Infrastructure Resilience Analysis Methodology (1/6)
  36. Chapter 10 - Infrastructure Resilience Analysis Methodology (2/6)
  37. Chapter 10 - Infrastructure Resilience Analysis Methodology (3/6)
  38. Chapter 10 - Infrastructure Resilience Analysis Methodology (4/6)
  39. Chapter 10 - Infrastructure Resilience Analysis Methodology (5/6)
  40. Chapter 10 - Infrastructure Resilience Analysis Methodology (6/6)
  41. Chapter 11 - Case Studies Using the Infrastructure Resilience Analysis Framework (1/8)
  42. Chapter 11 - Case Studies Using the Infrastructure Resilience Analysis Framework (2/8)
  43. Chapter 11 - Case Studies Using the Infrastructure Resilience Analysis Framework (3/8)
  44. Chapter 11 - Case Studies Using the Infrastructure Resilience Analysis Framework (4/8)
  45. Chapter 11 - Case Studies Using the Infrastructure Resilience Analysis Framework (5/8)
  46. Chapter 11 - Case Studies Using the Infrastructure Resilience Analysis Framework (6/8)
  47. Chapter 11 - Case Studies Using the Infrastructure Resilience Analysis Framework (7/8)
  48. Chapter 11 - Case Studies Using the Infrastructure Resilience Analysis Framework (8/8)
  49. Chapter 12 - Future Directions
  50. Appendix A: Example Use of Fault Trees to Identify Critical Assets
  51. Appendix B: Physical Protection Features Performance Data (1/3)
  52. Appendix B: Physical Protection Features Performance Data (2/3)
  53. Appendix B: Physical Protection Features Performance Data (3/3)
  54. Back Cover

Product information

  • Title: Critical Infrastructure System Security and Resiliency
  • Author(s): Betty Biringer, Eric Vugrin, Drake Warren
  • Release date: April 2013
  • Publisher(s): CRC Press
  • ISBN: 9781466557512