Critical Infrastructure Protection ( NATO Science for Peace and Security Series - E: Human and Societal Dynamics )

Publication series :NATO Science for Peace and Security Series - E: Human and Societal Dynamics

Author: Edwards   M.;  

Publisher: Ios Press‎

Publication year: 2014

E-ISBN: 9781614993575

P-ISBN(Hardback):  9781614993568

Subject: C91 Sociology

Keyword: null 社会学Sociology

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

The issue of protecting essential infrastructure against the threat of terrorist attack is one which continues to concern governments worldwide. But terrorism is not the only threat this infrastructure may face: environmental hazards, industrial accidents and sabotage are also major concerns. Protecting critical infrastructure is expensive, but many of the solutions apply whatever the cause of the problem, and in these days of scarce resources, multi-sector or multi-threat solutions are preferred. This book presents the proceedings of the NATO Centre of Excellence – Defence against Terrorism (COE-DAT) Advanced Research Workshop entitled Critical Infrastructure Protection, held in Ankara, Turkey, in May 2012. The workshop brought together 44 participants from 13 countries and consisted of five sessions: a general overview of policy, tools and techniques; the realities of implementation; protection of energy infrastructure; protection of communications and information infrastructure; and protection of transport infrastructure. The papers were presented by 16 expert speakers – military and civilian practitioners, business leaders, diplomats, and academics – from 6 countries, and each was followed by a detailed discussion and debate. The workshop concluded with a summary of all the topics reflected in the individual papers presented. This book represents a significant contribution to furthering the science of counterterrorism, and will be of interest to all whose work involves all aspects of Critical Infrastructure Protection and the terrorist threat to infrastructure.

Chapter

Conclusion

Conclusion

Bibliography

Bibliography

Critical Infrastructure Protection: The EU Perspective

Critical Infrastructure Protection: The EU Perspective

Introduction

Introduction

1. Background

1. Background

2. State of Play at the EU Level Regarding CIP

2. State of Play at the EU Level Regarding CIP

3. Main Features of EPCIP

3. Main Features of EPCIP

4. The Way Ahead: What's Next in 2012?

4. The Way Ahead: What's Next in 2012?

Conclusion

Conclusion

Leveraging Partnerships to Better Utilize Declining Resources: The Critical Infrastructure Risk Management Enhancement Initiative

Leveraging Partnerships to Better Utilize Declining Resources: The Critical Infrastructure Risk Management Enhancement Initiative

Introduction

Introduction

1. The Current Challenge

1. The Current Challenge

2. The Current Environment for Critical Infrastructure Protection and Resilience

2. The Current Environment for Critical Infrastructure Protection and Resilience

3. The Critical Infrastructure Risk Management Enhancement Initiative (CIRMEI)

3. The Critical Infrastructure Risk Management Enhancement Initiative (CIRMEI)

4. Managing Risk

4. Managing Risk

5. DHS Critical Infrastructure Regional Initiative

5. DHS Critical Infrastructure Regional Initiative

6. CIRMEI in Practice

6. CIRMEI in Practice

7. Responding to the Findings: Regional Resiliency Assessment Program (RRAP) as a Case Study

7. Responding to the Findings: Regional Resiliency Assessment Program (RRAP) as a Case Study

8. Tapping the International Community

8. Tapping the International Community

Conclusion

Conclusion

Bibliography

Bibliography

Critical Infrastructure Protection in a Post-9/11 World

Critical Infrastructure Protection in a Post-9/11 World

Introduction

Introduction

1. What Threatens Critical Infrastructure?

1. What Threatens Critical Infrastructure?

2. Post 9/11 CIP – A Case Study

2. Post 9/11 CIP – A Case Study

Conclusion

Conclusion

Bibliography

Bibliography

Practical Issues Facing Businesses in the Implementation of Critical Infrastructure Protection

Practical Issues Facing Businesses in the Implementation of Critical Infrastructure Protection

Introduction

Introduction

1. Implementing CIP Protection in Business

1. Implementing CIP Protection in Business

2. The Government Dilemma

2. The Government Dilemma

3. Private-Public Partnerships

3. Private-Public Partnerships

Conclusion

Conclusion

Critical Infrastructure and Its Impact on Energy Security

Critical Infrastructure and Its Impact on Energy Security

Introduction

Introduction

1. Definition: What does Energy Security Mean?

1. Definition: What does Energy Security Mean?

2. Maximizing Energy Security

2. Maximizing Energy Security

Conclusion

Conclusion

Bibliography

Bibliography

Threats to Energy Resources and Infrastructure

Threats to Energy Resources and Infrastructure

Introduction

Introduction

1. Cyberattack

1. Cyberattack

2. Conventional Warfare

2. Conventional Warfare

3. Unconventional Warfare

3. Unconventional Warfare

4. Criminal Activity

4. Criminal Activity

Conclusion

Conclusion

Bibliography

Bibliography

ANNEX A

ANNEX A

Assessing the Terrorist Threat to Critical Energy Infrastructure and Vulnerabilities

Assessing the Terrorist Threat to Critical Energy Infrastructure and Vulnerabilities

Needs and Options for Response

Needs and Options for Response

Opportunities for International Cooperation

Opportunities for International Cooperation

Conclusion

Conclusion

Protecting Pipelines - BTC as a Case Study

Protecting Pipelines - BTC as a Case Study

Introduction

Introduction

1. Critical Energy Infrastructure Security

1. Critical Energy Infrastructure Security

2. Pipelines in Turkey

2. Pipelines in Turkey

3. Security Threats against Pipelines

3. Security Threats against Pipelines

4. BTC’s Holistic Security Strategy

4. BTC’s Holistic Security Strategy

5. The Way Forward

5. The Way Forward

Conclusion

Conclusion

Bibliography

Bibliography

An Analysis of a Cyberattack on a Nuclear Plant: The STUXNET Worm

An Analysis of a Cyberattack on a Nuclear Plant: The STUXNET Worm

Introduction

Introduction

1. A History of Malware

1. A History of Malware

2. The STUXNET Worm

2. The STUXNET Worm

3. The Impact of STUXNET

3. The Impact of STUXNET

Conclusion

Conclusion

Bibliography

Bibliography

Strategies to Counter Cyberattacks: Cyberthreats and Critical Infrastructure Protection

Strategies to Counter Cyberattacks: Cyberthreats and Critical Infrastructure Protection

Introduction

Introduction

1. Strategies to Counter Cyberattacks

1. Strategies to Counter Cyberattacks

1.1 Cyberassets: Critical Infrastructures

1.1 Cyberassets: Critical Infrastructures

1.2 Cyber Threats

1.2 Cyber Threats

1.2.1 Hacktivism

1.2.1 Hacktivism

1.2.2 Cybercrime

1.2.2 Cybercrime

1.2.3 Cyberespionage

1.2.3 Cyberespionage

1.2.4 Cyberwar

1.2.4 Cyberwar

1.2.5 Cyberthreats - Final Remarks

1.2.5 Cyberthreats - Final Remarks

1.3 Vulnerabilities

1.3 Vulnerabilities

1.3.1 Technical Vulnerabilities

1.3.1 Technical Vulnerabilities

1.3.2 Non-Technical Vulnerabilities

1.3.2 Non-Technical Vulnerabilities

1.3.3 Vulnerabilities - Final Remarks

1.3.3 Vulnerabilities - Final Remarks

1.4 Countermeasures

1.4 Countermeasures

1.4.1 Technical Countermeasures

1.4.1 Technical Countermeasures

1.4.2 Non-technical Countermeasures

1.4.2 Non-technical Countermeasures

1.4.3 Countermeasures - Final Remarks

1.4.3 Countermeasures - Final Remarks

Conclusion

Conclusion

Bibliography

Bibliography

Transportation Security in the Context of Defense against Terrorism

Transportation Security in the Context of Defense against Terrorism

Introduction

Introduction

1. Security Challenges in Airports and Air Hubs

1. Security Challenges in Airports and Air Hubs

2. Transportation Security Technologies

2. Transportation Security Technologies

2.1 Overview

2.1 Overview

2.2 Emerging Solutions

2.2 Emerging Solutions

3. The IED Fight: A Comprehensive Approach

3. The IED Fight: A Comprehensive Approach

Conclusion

Conclusion

Bibliography

Bibliography

Valuable and Vulnerable: Protecting Maritime Infrastructure

Valuable and Vulnerable: Protecting Maritime Infrastructure

Introduction

Introduction

1. Maritime Security

1. Maritime Security

2. Assessing Maritime Infrastructure Risk

2. Assessing Maritime Infrastructure Risk

3. Maritime Domain Awareness

3. Maritime Domain Awareness

Conclusion

Conclusion

Bibliography

Bibliography

Planning Methodology for Critical Infrastructures Protection Capabilities

Planning Methodology for Critical Infrastructures Protection Capabilities

Introduction

Introduction

1. Defining the Criticality of Infrastructure Elements

1. Defining the Criticality of Infrastructure Elements

2. Framework Process for Planning Critical Infrastructure Protection

2. Framework Process for Planning Critical Infrastructure Protection

3. Methodological and Organizational Challenges

3. Methodological and Organizational Challenges

Conclusion

Conclusion

Bibliography

Bibliography

Subject Index

Subject Index

Author Index

Author Index

The users who browse this book also browse


No browse record.