Critical Infrastructure Resilience and Sustainability Reader.

Author
Lewis, Ted G. [Browse]
Format
Book
Language
English
Εdition
1st ed.
Published/​Created
  • Newark : John Wiley & Sons, Incorporated, 2023.
  • ©2024.
Description
1 online resource (291 pages)

Details

Subject(s)
Summary note
Critical Infrastructure Resilience and Sustainability Reader Identify and protect critical infrastructure from a wide variety of threats In Critical Infrastructure Resilience and Sustainability Reader, Ted G. Lewis delivers a clear and compelling discussion of what infrastructure requires protection, how to protect it, and the consequences of failure. Through the book, you'll examine the intersection of cybersecurity, climate change, and sustainability as you reconsider and reexamine the resilience of your infrastructure systems. The author walks you through how to conduct accurate risk assessments, make sound investment decisions, and justify your actions to senior executives. You'll learn how to protect water supplies, energy pipelines, telecommunication stations, power grids, and a wide variety of computer networks, without getting into the weeds of highly technical mathematical models. Critical Infrastructure Resilience and Sustainability Reader also includes: A thorough introduction to the daunting challenges facing infrastructure and the professionals tasked with protecting it Comprehensive explorations of the proliferation of cyber threats, terrorism in the global West, climate change, and financial market volatility Practical discussions of a variety of infrastructure sectors, including how they work, how they're regulated, and the threats they face Clear graphics, narrative guides, and a conversational style that makes the material easily accessible to non-technical readers Perfect for infrastructure security professionals and security engineering firms, Critical Infrastructure Resilience and Sustainability Reader will also benefit corporate security managers and directors, government actors and regulators, and policing agencies, emergency services, and first responders.
Notes
4.3.2 Attack Scenario 2: Destruction of Major Transformers
Source of description
Description based on publisher supplied metadata and other sources.
Contents
  • Cover
  • Title Page
  • Copyright Page
  • Contents
  • Preface
  • Chapter 1 The Challenge
  • 1.1 The Evolution of Critical Infrastructure Protection
  • 1.1.1 In the Beginning
  • 1.1.2 Natural Disaster Recovery
  • 1.1.3 What Is Critical?
  • 1.1.4 Public-Private Cooperation
  • 1.1.5 Federalism: Whole of Government
  • 1.2 Defining CIKR Risk and Resilience
  • 1.2.1 Risk Strategy
  • 1.2.2 Resilience Strategy
  • 1.2.3 Sustainability Strategy
  • 1.2.4 The Four Horsemen
  • 1.3 Weather/Climate Change/Global Warming
  • 1.3.1 The Carrington Event
  • 1.3.2 Black Bodies
  • 1.3.3 The Lightening Rod
  • 1.4 Consequences
  • 1.4.1 Accidents/Aging/Neglect
  • 1.4.2 The Report Card
  • 1.4.2.1 The Domino Effect
  • 1.4.3 Terrorism/Extremists
  • 1.4.4 Cyber Exploits/Criminals
  • 1.4.4.1 Black Hats
  • 1.4.4.2 Cybercrime Pays
  • 1.4.5 The Soft War
  • 1.4.6 Cyberattacks and CIKR
  • 1.5 Discussion
  • References
  • Chapter 2 What is a Catastrophe?
  • 2.1 Theories of Collapse
  • 2.1.1 Normal Accident Theory (NAT)
  • 2.1.2 Punctuated Equilibrium Theory (PET)
  • 2.1.3 How Uncertain are Avalanches?
  • 2.1.4 Self-Organized Criticality
  • 2.2 Complex Systems Theory
  • 2.2.1 Tragedy of the Commons (TOC)
  • 2.2.2 Paradox of Enrichment (POE)
  • 2.2.3 Competitive Exclusion Principle (CEP)
  • 2.2.4 Paradox of Redundancy (POR)
  • 2.3 General Systems Theory
  • 2.3.1 Emergence
  • 2.3.2 Self-Organization
  • 2.3.3 Preferential Attachment
  • 2.4 Vulnerable Industrial Commons
  • 2.4.1 TOC Failure
  • 2.4.2 POE Failure
  • 2.4.3 CEP Failure
  • 2.4.4 POR Failure
  • 2.5 Resilience Versus Sustainability
  • 2.5.1 Black Swans
  • 2.5.2 Catastrophe's Long Tail
  • 2.6 Discussion
  • Chapter 3 Energy Transition
  • 3.1 A Sector Under Transition
  • 3.2 Energy Fundamentals
  • 3.2.1 Understanding Units and Measures
  • 3.2.2 Consumption
  • 3.3 Regulatory Structure of the Energy Sector.
  • 3.3.1 Evolution of Energy Sector Regulation
  • 3.3.2 Energy Pipeline Regulations
  • 3.3.3 The Energy ISAC
  • 3.4 Legacy Fuels
  • 3.4.1 Coal
  • 3.4.2 The Rise of Oil and the Automobile
  • 3.4.3 Natural Gas Middlemen
  • 3.4.4 Nuclear Fuel
  • 3.5 Legacy Energy Infrastructure
  • 3.5.1 Oil Refineries
  • 3.5.2 Oil Transmission and Distribution
  • 3.5.3 Oil Storage
  • 3.5.4 The Natural Gas Supply Chain
  • 3.5.5 The Critical Gulf of Mexico Cluster
  • 3.5.6 Critical Refineries
  • 3.5.7 Critical Transmission Pipelines
  • 3.6 Renewables
  • 3.7 Solar - Photovoltaic (PV)
  • 3.7.1 Wind
  • 3.7.2 The Hydrogen Circle
  • 3.7.3 Others
  • 3.8 Batteries and Reservoirs
  • 3.8.1 Modern Batteries
  • 3.8.2 Grid Scale Storage - LDES
  • 3.9 Discussion
  • Chapter 4 The Vulnerable Powergrid
  • 4.1 What Is the Grid?
  • 4.2 The North American Grid
  • 4.2.1 Grid Structure
  • 4.2.2 ACE and Kirchhoff's Law
  • 4.2.3 Anatomy of a Blackout
  • 4.3 Threat Analysis
  • 4.3.1 Attack Scenario 1: Disruption of Fuel Supply to Power Plants
  • 4.3.2 Attack Scenario 2: Destruction of Major Transformers
  • 4.3.3 Attack Scenario 3: Disruption of SCADA Communications
  • 4.3.4 Attack Scenario 4: Creation of a Cascading Transmission Failure
  • 4.4 From Death Rays to Vertical Integration
  • 4.4.1 Early Regulation
  • 4.4.2 Deregulation and EPACT 1992
  • 4.4.3 Electricity Sector ES-ISAC
  • 4.5 Out of Orders 888 and 889 Comes Chaos
  • 4.5.1 Economics Versus Physics
  • 4.5.2 What Increases SOC?
  • 4.5.3 NIMBY Versus Environmentalism
  • 4.5.4 A Change of Heart
  • 4.6 The Architecture of Twenty-First Century Grids
  • 4.6.1 The Future Is Storage
  • 4.6.2 SOC Is Reduced
  • 4.6.3 Economics of Electrification
  • 4.7 Discussion
  • Chapter 5 Water and Water Treatment
  • 5.1 A Vanishing Resource
  • 5.1.1 From Germs to Terrorists
  • 5.1.2 Safe Drinking Water Act
  • 5.1.3 The WaterISAC.
  • 5.2 Foundations: SDWA of 1974
  • 5.3 The Bio-Terrorism Act of 2002
  • 5.3.1 Is Water for Drinking?
  • 5.3.2 Climate Change and Rot - The New Threats
  • 5.4 The Architecture of Water Systems
  • 5.4.1 The Law of the River
  • 5.4.2 Resiliency of Water Pipeline Networks
  • 5.5 Hetch Hetchy Water
  • 5.5.1 Risk Analysis
  • 5.5.2 Resilience Analysis
  • 5.6 Threat Analysis
  • 5.6.1 The Rational Actor
  • 5.6.2 Hetch Hetchy Threat Analysis
  • 5.6.3 Chem-Bio
  • 5.6.4 Earthquakes
  • 5.7 Water Resilience
  • 5.7.1 Save the Pineapple Express
  • 5.7.2 Gray Water
  • 5.7.3 Desalination
  • 5.7.4 Exemplar Israel
  • 5.8 Discussion
  • Chapter 6 Transportation Renewed
  • 6.1 Transitioning a Vast and Complex Sector
  • 6.1.1 Government Leads the Way
  • 6.1.2 Safety and Security
  • 6.2 Roads at TOC Risk
  • 6.2.1 The Road to Prosperity
  • 6.2.2 Economic Impact
  • 6.2.3 The National Highway System (NHS)
  • 6.2.4 The Interstate Highway Network is Resilient
  • 6.2.5 The NHS is Safer
  • 6.2.6 The Future is Electric
  • 6.3 Rail and Railroads
  • 6.3.1 Birth of Regulation
  • 6.3.2 Freight Trains
  • 6.3.3 Passenger Rail
  • 6.3.4 Terrorist Target Passenger Trains
  • 6.3.5 Economics of Rail
  • 6.4 Air Transportation
  • 6.4.1 Resilience of the Hub-and-Spoke Network
  • 6.4.2 Security of Commercial Air Travel
  • 6.4.3 How Safe and Secure is Flying in the United States?
  • 6.4.4 Drones
  • 6.4.5 eVTOLs
  • 6.4.6 Commercial Airline Impact on Global Warming
  • 6.5 Discussion
  • Chapter 7 Supply Chains
  • 7.1 The World is Flat, but Tilted
  • 7.1.1 Supply Side Supply
  • 7.1.2 The Father of Containerization
  • 7.1.3 The Perils of Efficient Supply Chains
  • 7.2 The World Trade Web
  • 7.2.1 WTW and Economic Contagions
  • 7.2.2 Resilience Failures
  • 7.3 TWIC
  • 7.3.1 MSRAM
  • 7.3.2 PROTECT
  • 7.4 Sustainable and Resilient Supply Chains
  • 7.4.1 Greening of Ships.
  • 7.5 Are Supply Chains Secure?
  • 7.5.1 Encapsulation Works
  • 7.5.2 Who Owns the Trusted Path?
  • 7.6 Discussion
  • Chapter 8 Communications and the Internet
  • 8.1 Early Years
  • 8.1.1 The Natural Monopoly
  • 8.1.2 The Communications Act of 1996
  • 8.2 Regulatory Structure
  • 8.2.1 The Most Important Person in Modern History
  • 8.2.2 The First (Modern) Critical Infrastructure
  • 8.3 The Architecture of the Communications Sector
  • 8.3.1 Physical Infrastructure
  • 8.3.2 Wireless Networks
  • 8.3.3 Extra-Terrestrial Communication
  • 8.3.4 Land Earth Stations
  • 8.3.5 Cellular Networks
  • 8.3.6 Cell Phone Generations
  • 8.3.7 Wi-Fi Technology
  • 8.4 Risk and Resilience Analysis
  • 8.4.1 Importance of Carrier Hotels
  • 8.4.2 The Submarine Cable Network
  • 8.4.3 HPM Threats
  • 8.4.4 Cellular Network Threats
  • 8.4.5 Physical Threats
  • 8.5 The Monoculture Internet
  • 8.5.1 The Internet Self-Organized
  • 8.5.2 The Original Sins
  • 8.5.2.1 The DNS
  • 8.5.2.2 More Original Sin
  • 8.5.3 The Hierarchical Internet
  • 8.5.4 Too Many Open Ports
  • 8.6 Internet Governance
  • 8.6.1 IAB and IETF
  • 8.6.2 ICANN Wars
  • 8.6.3 ISOC
  • 8.6.4 W3C
  • 8.6.5 Internationalization
  • 8.6.6 Regulation and Balkanization
  • 8.6.6.1 Rise of Regulation
  • 8.6.6.2 Criticality of the Internet
  • 8.7 Green Communications
  • 8.7.1 Solar Computing
  • 8.7.2 Quantum Communications
  • 8.7.3 Adiabatic Logic
  • 8.8 Discussion
  • Chapter 9 Cyber Threats
  • 9.1 Threat Surface
  • 9.1.1 Script-kiddies
  • 9.1.2 Black Hats
  • 9.1.3 Weaponized Exploits
  • 9.1.4 Ransomware and the NSA
  • 9.2 Basic Vulnerabilities
  • 9.2.1 The First Exploit
  • 9.2.2 TCP/IP Flaws
  • 9.2.3 Open Ports
  • 9.2.4 Buffer Overflow Exploits
  • 9.2.5 DDoS Attacks
  • 9.2.6 Email Exploits
  • 9.2.7 Flawed Application and System Software
  • 9.2.8 Trojans, Worms, Viruses, and Keyloggers.
  • 9.2.9 Hacking the DNS
  • 9.2.10 Hardware Flaws
  • 9.2.11 Botnets
  • 9.3 Cyber Risk Analysis
  • 9.3.1 Kill Chain Approach
  • 9.3.2 Machine-learning Approach
  • 9.4 Analysis
  • 9.5 Discussion
  • Chapter 10 Social Hacking
  • 10.1 Web 2.0 and the Social Network
  • 10.2 Social Networks Amplify Memes
  • 10.3 Topology Matters
  • 10.4 Computational Propaganda
  • 10.5 Beware the Echo Chamber
  • 10.6 Big Data Analytics
  • 10.6.1 Algorithmic Bias
  • 10.6.2 The Depths of Deep Learning
  • 10.6.3 Data Brokers
  • 10.7 GDPR
  • 10.8 Social Network Resilience
  • 10.9 The Sustainable Web
  • 10.9.1 The Century of Regulation
  • 10.9.2 The NetzDG
  • 10.10 Discussion
  • Chapter 11 Banking and Finance
  • CHAPTER MENU
  • 11.1 The Financial System
  • 11.1.1 Federal Reserve Versus US Treasury
  • 11.1.2 Operating the System
  • 11.1.3 Balancing the Balance Sheet
  • 11.1.4 Paradox of Enrichment
  • 11.2 Financial Networks
  • 11.2.1 FedWire
  • 11.2.2 TARGET
  • 11.2.3 SWIFT
  • 11.2.4 Credit Card Networks
  • 11.2.5 3-D Secure Payment
  • 11.3 Virtual Currency
  • 11.3.1 Intermediary PayPal
  • 11.3.2 ApplePay
  • 11.3.3 Cryptocurrency
  • 11.3.3.1 Nakamoto's Revenge
  • 11.3.3.2 Double Spend Problem
  • 11.3.3.3 Crypto Challenges
  • 11.4 Hacking a Financial Network
  • 11.5 Hot Money
  • 11.5.1 Liquidity Traps
  • 11.5.2 The Dutch Disease
  • 11.6 The End of Stimulus?
  • 11.7 Fractal Markets
  • 11.7.1 Efficient Market Hypothesis (EMH)
  • 11.7.2 Fractal Market Hypothesis (FMH)
  • 11.7.3 Predicting Collapse
  • 11.8 The Threat is Existential
  • 11.9 Discussion
  • Chapter 12 Banking and Finance: Strategies for a Changing World
  • 12.1 Whole of Government
  • 12.2 Risk and Resilience
  • 12.3 Complex and Emergent CIKR
  • 12.3.1 Communications and IT
  • 12.3.2 Internet and Cybersecurity
  • 12.4 Surveillance Capitalism
  • 12.5 Industrial Control Systems.
  • 12.6 Global Pandemics.
ISBN
  • 9781394179534
  • 1394179537
OCLC
1396064040
Statement on responsible collection description
Princeton University Library aims to describe library materials in a manner that is respectful to the individuals and communities who create, use, and are represented in the collections we manage. Read more...
Other views
Staff view