Chapter
Critical Infrastructure Protection: The EU Perspective
Critical Infrastructure Protection: The EU Perspective
2. State of Play at the EU Level Regarding CIP
2. State of Play at the EU Level Regarding CIP
3. Main Features of EPCIP
3. Main Features of EPCIP
4. The Way Ahead: What's Next in 2012?
4. The Way Ahead: What's Next in 2012?
Leveraging Partnerships to Better Utilize Declining Resources: The Critical Infrastructure Risk Management Enhancement Initiative
Leveraging Partnerships to Better Utilize Declining Resources: The Critical Infrastructure Risk Management Enhancement Initiative
2. The Current Environment for Critical Infrastructure Protection and Resilience
2. The Current Environment for Critical Infrastructure Protection and Resilience
3. The Critical Infrastructure Risk Management Enhancement Initiative (CIRMEI)
3. The Critical Infrastructure Risk Management Enhancement Initiative (CIRMEI)
5. DHS Critical Infrastructure Regional Initiative
5. DHS Critical Infrastructure Regional Initiative
7. Responding to the Findings: Regional Resiliency Assessment Program (RRAP) as a Case Study
7. Responding to the Findings: Regional Resiliency Assessment Program (RRAP) as a Case Study
8. Tapping the International Community
8. Tapping the International Community
Critical Infrastructure Protection in a Post-9/11 World
Critical Infrastructure Protection in a Post-9/11 World
1. What Threatens Critical Infrastructure?
1. What Threatens Critical Infrastructure?
2. Post 9/11 CIP – A Case Study
2. Post 9/11 CIP – A Case Study
Practical Issues Facing Businesses in the Implementation of Critical Infrastructure Protection
Practical Issues Facing Businesses in the Implementation of Critical Infrastructure Protection
1. Implementing CIP Protection in Business
1. Implementing CIP Protection in Business
2. The Government Dilemma
2. The Government Dilemma
3. Private-Public Partnerships
3. Private-Public Partnerships
Critical Infrastructure and Its Impact on Energy Security
Critical Infrastructure and Its Impact on Energy Security
1. Definition: What does Energy Security Mean?
1. Definition: What does Energy Security Mean?
2. Maximizing Energy Security
2. Maximizing Energy Security
Threats to Energy Resources and Infrastructure
Threats to Energy Resources and Infrastructure
3. Unconventional Warfare
3. Unconventional Warfare
Assessing the Terrorist Threat to Critical Energy Infrastructure and Vulnerabilities
Assessing the Terrorist Threat to Critical Energy Infrastructure and Vulnerabilities
Needs and Options for Response
Needs and Options for Response
Opportunities for International Cooperation
Opportunities for International Cooperation
Protecting Pipelines - BTC as a Case Study
Protecting Pipelines - BTC as a Case Study
1. Critical Energy Infrastructure Security
1. Critical Energy Infrastructure Security
3. Security Threats against Pipelines
3. Security Threats against Pipelines
4. BTC’s Holistic Security Strategy
4. BTC’s Holistic Security Strategy
An Analysis of a Cyberattack on a Nuclear Plant: The STUXNET Worm
An Analysis of a Cyberattack on a Nuclear Plant: The STUXNET Worm
Strategies to Counter Cyberattacks: Cyberthreats and Critical Infrastructure Protection
Strategies to Counter Cyberattacks: Cyberthreats and Critical Infrastructure Protection
1. Strategies to Counter Cyberattacks
1. Strategies to Counter Cyberattacks
1.1 Cyberassets: Critical Infrastructures
1.1 Cyberassets: Critical Infrastructures
1.2.5 Cyberthreats - Final Remarks
1.2.5 Cyberthreats - Final Remarks
1.3.1 Technical Vulnerabilities
1.3.1 Technical Vulnerabilities
1.3.2 Non-Technical Vulnerabilities
1.3.2 Non-Technical Vulnerabilities
1.3.3 Vulnerabilities - Final Remarks
1.3.3 Vulnerabilities - Final Remarks
1.4.1 Technical Countermeasures
1.4.1 Technical Countermeasures
1.4.2 Non-technical Countermeasures
1.4.2 Non-technical Countermeasures
1.4.3 Countermeasures - Final Remarks
1.4.3 Countermeasures - Final Remarks
Transportation Security in the Context of Defense against Terrorism
Transportation Security in the Context of Defense against Terrorism
1. Security Challenges in Airports and Air Hubs
1. Security Challenges in Airports and Air Hubs
2. Transportation Security Technologies
2. Transportation Security Technologies
3. The IED Fight: A Comprehensive Approach
3. The IED Fight: A Comprehensive Approach
Valuable and Vulnerable: Protecting Maritime Infrastructure
Valuable and Vulnerable: Protecting Maritime Infrastructure
2. Assessing Maritime Infrastructure Risk
2. Assessing Maritime Infrastructure Risk
3. Maritime Domain Awareness
3. Maritime Domain Awareness
Planning Methodology for Critical Infrastructures Protection Capabilities
Planning Methodology for Critical Infrastructures Protection Capabilities
1. Defining the Criticality of Infrastructure Elements
1. Defining the Criticality of Infrastructure Elements
2. Framework Process for Planning Critical Infrastructure Protection
2. Framework Process for Planning Critical Infrastructure Protection
3. Methodological and Organizational Challenges
3. Methodological and Organizational Challenges