𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Critical Infrastructure System Security and Resiliency

✍ Scribed by Betty E Biringer


Publisher
Taylor & Francis, CRC Press
Year
2013
Tongue
English
Leaves
221
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


''Part l: Security risk assessment. Chapter 1. Introduction to Security Risk Assessment As our nation moves forward in the age of information and global economy, our dependencies on national infrastructure is greater than ever. Compromise of our critical infrastructures could disrupt the functions of our government, business, and our way of life. Catastrophic losses in terms of human casualties, property destruction, Read more...

✦ Table of Contents



Content: SECURITY RISK ASSESSMENT Introduction to Security Risk Assessment Security Risk Assessment Protection System Robustness Security System Resiliency System Approach for Security Risk Assessment Determine Undesired Events, Associated Critical Assets, and Available Resources Threat Analysis Assess Likelihood of Initiating Event Estimate Protection System Effectiveness Assess Consequences for Undesired Event Estimate Security Risk Upgrade the Protection System to Be Robust against Undesired Event Upgrade Security System to Be Resilient for Undesired Event Undesired Events, Associated Critical Assets, and Available Resources Critical Assets Logic Model Threat Analysis Malevolent Threats Type of Adversary Adversary Capability Design Basis Threat Natural Hazards Hurricane Earthquake Tornado Flood Accidents Likelihood of Initiating Events Malevolent Threat Outsider Threat Insider Threat Natural Hazard Threat Accident Threat Assess Consequences and Responses for Undesired Event Reference Table for Consequences Estimating Consequence Level for Undesired Events Assessment of Protection System Effectiveness Assessment of Protection System Effectiveness for Malevolent Threat Adversary Scenarios Effective Physical Protection System for the Malevolent Threat Physical Protection System Effectiveness Assessment Physical Protection System Effectiveness Assessment-Example Protection System Effectiveness against Blast Attacks Protection System Effectiveness for Blast Attacks Assessment-Example Mitigation of the Insider Threat Cyber Protection System Effectiveness Cyber Functions Cyber Protection System Effectiveness Assessment-Example Effectiveness for Natural Hazards Protection System Effectiveness Assessment for Natural Hazards-Example Protection System Effectiveness for Accidents Protection System Effectiveness Assessment for Accidents-Example Estimate Security Risk System Approach for Security Risk Assessment Determine Undesired Events, Associated Critical Assets, and Available Resources Threat Analysis Assess Likelihood of Initiating Event Estimate Protection System Effectiveness Assess Consequences for Undesired Event Estimate Security Risk Upgrade Protection System to Be Robust against Undesired Event Upgrade Security System to Be Resilient for Undesired Event EVALUATION AND DESIGN OF RESILIENT SYSTEMS Motivating Infrastructure Resilience Analysis Current State of Resilience Assessment Definitions of Resilience Domains Assessment Processes Structural Resilience Assessment Methodologies Performance-Based Measurement Hybrid Approaches Gaps and Limitations Infrastructure Resilience Analysis Methodology Definition of Resilience Measurement of Resilience Costs Systemic Impact Total Recovery Effort Resilience Cost Calculation Use and Interpretation of Recovery-Dependent Resilience Costs and Optimal Resilience Costs Quantities Additional Notes on Calculation of Resilience Costs Qualitative Structural Analysis Absorptive Capacity Adaptive Capacity Restorative Capacity Additional Notes on Resilience Capacities Applying the Infrastructure Resilience Analysis Methodology Case Studies Using the Infrastructure Resilience Analysis Framework Qualitative Resilience Analysis Case Study Define Systems Define Scenario Perform Structural Analysis Analysis Conclusions Quantitative Resilience Analysis Case Study Define Systems Define Scenario Define Metrics and Obtain Data Calculate Resilience Costs Perform Structural Analysis Case Study on Optimizing Resilient Recovery Strategies Define Systems Define Scenario Define Metrics Obtain Data and Calculate Resilience Costs Future Directions APPENDIX A: EXAMPLE USE OF FAULT TREES TO IDENTIFY CRITICAL ASSETS APPENDIX B: PHYSICAL PROTECTION FEATURES PERFORMANCE DATA INDEX
Abstract: ''Part l: Security risk assessment. Chapter 1. Introduction to Security Risk Assessment As our nation moves forward in the age of information and global economy, our dependencies on national infrastructure is greater than ever. Compromise of our critical infrastructures could disrupt the functions of our government, business, and our way of life. Catastrophic losses in terms of human casualties, property destruction, economic damages, and loss of public confidence could result from disruptions or degradation in our national infrastructure. ''Critical infrastructures are the assets, systems, and networks, whether physical or virtual, so vital to the United States that their incapacitation or destruction would have a debilitating effect on security, national economic security, public health or safety, or any combination thereof'' (U.S. Department of Homeland Security 2010). The Homeland Security Presidential Directive 7 (HSPD-7) (U.S. Department of Homeland Security 2010) identified 18 critical infrastructure sectors and a designated federal Sector-Specific Agency to lead protection and resilience-building programs and activities. The sectors include: - Agriculture and Food, - Banking and Finance, - Chemical, - Commercial Facilities, - Communications, - Critical Manufacturing, - Dams, - Defense Industrial Base, - Emergency Services, - Energy, - Government Facilities, - Healthcare and Public Health, - Information Technology, - National Monuments and Icons, - Nuclear Reactors, - Postal and Shipping, - Transportation Systems, and - Water''


πŸ“œ SIMILAR VOLUMES


The Security of Critical Infrastructures
✍ Marcus Matthias Keupp (editor) πŸ“‚ Library πŸ“… 2020 πŸ› Springer 🌐 English

This book analyzes the security of critical infrastructures such as road, rail, water, health, and electricity networks that are vital for a nation’s society and economy, and assesses the resilience of these networks to intentional attacks. The book combines the analytical capabilities of experts in

Critical Infrastructure Security and Res
✍ Dimitris Gritzalis, Marianthi Theocharidou, George Stergiopoulos (editors) πŸ“‚ Library πŸ“… 2019 πŸ› Springer 🌐 English

This book presents the latest trends in attacks and protection methods of Critical Infrastructures. It describes original research models and applied solutions for protecting major emerging threats in Critical Infrastructures and their underlying networks. It presents a number of emerging endeavors,

Resilience of Critical Infrastructure Sy
✍ Zhishen Wu (Editor); Xilin Lu (Editor); Mohammad Noori (Editor) πŸ“‚ Library πŸ“… 2020 πŸ› CRC Press

<p>With rapid urbanization in developing countries and the emergence of smart systems and integrated intelligent devices, the new generation of infrastructure will be smarter and more efficient. However, due to natural and anthropomorphic hazards, as well as the adverse impact of climate change, civ

Sustainable and Resilient Critical Infra
✍ Gesara Satumtira, Leonardo DueΓ±as-Osorio (auth.), Kasthurirangan Gopalakrishnan, πŸ“‚ Library πŸ“… 2010 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>Sustainable and resilient critical infrastructure systems is an emerging paradigm in an evolving era of depleting assets in the midst of natural and man-made threats to provide a sustainable and high quality of life with optimized resources from social, economic, societal and environmental consid

IT Infrastructure: Security and Resilien
✍ Ralf Süß, Yannik Süß πŸ“‚ Library πŸ“… 2024 πŸ› Apress 🌐 English

Embark on a comprehensive journey into the intricate world of IT infrastructure, with an in-depth look into the transformational role of secure, private data centers in today's digital era. This exploration uncovers the multi-faceted domains of IaaS, PaaS, and SaaS, examining the primary components