Book description
Security protections for critical infrastructure nodes are intended to minimize the risks resulting from an initiating event, whether it is an intentional malevolent act or a natural hazard. With an emphasis on protecting an infrastructure's ability to perform its mission or function, Critical Infrastructure System Security and Resiliency presents
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents (1/2)
- Contents (2/2)
- List of Figures
- List of Tables
- Foreword
- Acknowledgments
- About the Authors
- Acronyms and Abbreviations
- Chapter 1 - Introduction to Security Risk Assessment (1/2)
- Chapter 1 - Introduction to Security Risk Assessment (2/2)
- Chapter 2 - Undesired Events, Associated Critical Assets, and Available Resources (1/2)
- Chapter 2 - Undesired Events, Associated Critical Assets, and Available Resources (2/2)
- Chapter 3 - Threat Analysis (1/3)
- Chapter 3 - Threat Analysis (2/3)
- Chapter 3 - Threat Analysis (3/3)
- Chapter 4 - Likelihood of Initiating Events (1/2)
- Chapter 4 - Likelihood of Initiating Events (2/2)
- Chapter 5 - Assess Consequences and Responses for Undesired Event
- Chapter 6 - Assessment of Protection System Effectiveness (1/4)
- Chapter 6 - Assessment of Protection System Effectiveness (2/4)
- Chapter 6 - Assessment of Protection System Effectiveness (3/4)
- Chapter 6 - Assessment of Protection System Effectiveness (4/4)
- Chapter 7 - Estimate Security Risk (1/3)
- Chapter 7 - Estimate Security Risk (2/3)
- Chapter 7 - Estimate Security Risk (3/3)
- Chapter 8 - Motivating Infrastructure Resilience Analysis
- Chapter 9 - Current State of Resilience Assessment (1/6)
- Chapter 9 - Current State of Resilience Assessment (2/6)
- Chapter 9 - Current State of Resilience Assessment (3/6)
- Chapter 9 - Current State of Resilience Assessment (4/6)
- Chapter 9 - Current State of Resilience Assessment (5/6)
- Chapter 9 - Current State of Resilience Assessment (6/6)
- Chapter 10 - Infrastructure Resilience Analysis Methodology (1/6)
- Chapter 10 - Infrastructure Resilience Analysis Methodology (2/6)
- Chapter 10 - Infrastructure Resilience Analysis Methodology (3/6)
- Chapter 10 - Infrastructure Resilience Analysis Methodology (4/6)
- Chapter 10 - Infrastructure Resilience Analysis Methodology (5/6)
- Chapter 10 - Infrastructure Resilience Analysis Methodology (6/6)
- Chapter 11 - Case Studies Using the Infrastructure Resilience Analysis Framework (1/8)
- Chapter 11 - Case Studies Using the Infrastructure Resilience Analysis Framework (2/8)
- Chapter 11 - Case Studies Using the Infrastructure Resilience Analysis Framework (3/8)
- Chapter 11 - Case Studies Using the Infrastructure Resilience Analysis Framework (4/8)
- Chapter 11 - Case Studies Using the Infrastructure Resilience Analysis Framework (5/8)
- Chapter 11 - Case Studies Using the Infrastructure Resilience Analysis Framework (6/8)
- Chapter 11 - Case Studies Using the Infrastructure Resilience Analysis Framework (7/8)
- Chapter 11 - Case Studies Using the Infrastructure Resilience Analysis Framework (8/8)
- Chapter 12 - Future Directions
- Appendix A: Example Use of Fault Trees to Identify Critical Assets
- Appendix B: Physical Protection Features Performance Data (1/3)
- Appendix B: Physical Protection Features Performance Data (2/3)
- Appendix B: Physical Protection Features Performance Data (3/3)
- Back Cover
Product information
- Title: Critical Infrastructure System Security and Resiliency
- Author(s):
- Release date: April 2013
- Publisher(s): CRC Press
- ISBN: 9781466557512
You might also like
book
Foundations of Information Security
In this high-level survey of the information security field, best-selling author Jason Andress covers the basics …
book
Digital Forensics and Incident Response - Second Edition
Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniques Key …
book
Digital Forensics and Incident Response
A practical guide to deploying digital forensic techniques in response to cyber security incidents About This …
book
IT Auditing Using Controls to Protect Information Assets, Third Edition, 3rd Edition
Secure Your Systems Using the Latest IT Auditing Techniques Fully updated to cover leading-edge tools and …