E-Book, Englisch, 278 Seiten
Hyslop Critical Information Infrastructures
1. Auflage 2007
ISBN: 978-0-387-71862-0
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Resilience and Protection
E-Book, Englisch, 278 Seiten
ISBN: 978-0-387-71862-0
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
The world moves on Critical Information Infrastructures, and their resilience and protection is of vital importance. Starting with some basic definitions and assumptions on the topic, this book goes on to explore various aspects of Critical Infrastructures throughout the world - including the technological, political, economic, strategic and defensive. This book will be of interest to the CEO and Academic alike as they grapple with how to prepare Critical Information Infrastructures for new challenges.
Autoren/Hrsg.
Weitere Infos & Material
1;Contents;5
2;The Author;9
3;Acknowledgments;10
4;Introduction;11
5;Definitions and Assumptions;18
5.1;Resilience General Definition;18
5.2;Resilience in Materials Science;19
5.3;Resilience in Ecology;19
5.4;Resilience in Psychology;19
5.5;Resilience in Business;19
5.6;Resiliency;19
5.7;Resilience in this Book;19
6;Critical Infrastructures and Critical Information Infrastructures: Approaches by Geography;29
6.1;Executive Order on Critical Infrastructure Protection;30
6.2;Ownership of Infrastructure;45
6.3;Risks in Critical Infrastructure;46
6.4;IT Threats to Critical Infrastructure;47
6.5;Vulnerability of Infrastructure to IT-Borne Attacks;48
6.6;Homogeneity of IT Systems;49
6.7;Complexity;50
6.8;Availability of IT Security Staff;50
6.9;Legal Issues Criminal Law;50
6.10;Disclosure;51
6.11;Liability;51
6.12;Electronic Authentication;52
6.13;Malware and Identity Theft;52
6.14;Digital Identity Online;52
6.15;RFID, Sensors, and Pervasive Networks;53
7;Critical Infrastructures and Critical Information Infrastructures: By Type;55
7.1;Medium to Long Term;63
8;Critical Information Infrastructure;71
8.1;The Big Picture;75
8.2;Actionable Road Map;75
8.3;Incident Response Procedures;81
8.4;Reporting an Incident;82
8.5;Unsolicited E-mail (SPAM);82
8.6;Defamatory Material;83
8.7;Why so Much Security?;83
8.8;Introduction to WARPs;84
8.9;WARP Strategy;85
8.10;WARPs and Information Sharing;85
9;Some Political, Economic, Social, Technological, Environmental, Legal, and Other Process Effects on Critical Infrastructures;87
10;Comments on Standards in Information Security, Disaster Recovery, Business Continuity, and Business Resilience;104
11;A Tangential Threat to OECD Resilience: The Twenty- First Century East India Company177;155
12;Resilience and Outsourcing Call Centers Offshore: A Case Study;160
13;Information Infrastructure: Resilience, Recovery, and Security;168
13.1;Individual;186
14;A Suggested Approach to Individual, Corporate, National, and International Resilience, Critical Infrastructures, and Critical Information Infrastructures;186
14.1;Corporate;187
14.2;National;188
14.3;The Public–Private Partnership;191
14.4;A National Defense Model;192
14.5;International;194
14.6;The North Atlantic Treaty Washington, DC – 4 April 1949;200
15;General Summary and Conclusions;204
16;A Manifesto for Change;208
17;Appendix An Introductory Information Infrastructure Resilience, Recovery and Security Bibliography;211
17.1;Introduction;211
17.2;Bibliographies/Lists/Directories/Surveys/ Search Engines;212
17.3;Books – Arranged Alphabetically by Subject;216
17.4;Articles – Arranged Alphabetically By Subject;238
18;Index;276




