E-Book, Englisch, 656 Seiten, E-Book
Sullivant Strategies for Protecting National Critical Infrastructure Assets
1. Auflage 2008
ISBN: 978-0-470-22836-4
Verlag: John Wiley & Sons
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
A Focus on Problem-Solving
E-Book, Englisch, 656 Seiten, E-Book
ISBN: 978-0-470-22836-4
Verlag: John Wiley & Sons
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Strategies for Protecting National Critical InfrastructureAssets eases the research burden, develops investigativeprotocols, and pulls together data into a comprehensive andpractical guide, to help the serious reader understand advancedconcepts and techniques of risk assessment with an emphasis onmeeting the security needs of the critical national infrastructure.The text is divided into five major sections, which are furtherbroken down by individual chapters, each addressing one element ofrisk assessment as well as focusing attention on applying the riskassessment methodology to a particular industry. This bookestablishes a new and acceptable approach for conducting riskassessments in a high-risk world.
* Helps the reader to understand advanced concepts and techniquesof risk assessment
* Provides a quick, reliable, and practical "briefcase" referenceto use in the office as well as on the road
* Introduces the elements of the risk assessment process bydefining its purpose and objectives, describing the behavioural andphysical sciences, the techniques employed in the process, and themeasurement and evaluation tools and standards used to perform anobjective risk assessment.
Autoren/Hrsg.
Weitere Infos & Material
PART 1: UNDERSTANDING THE ENVIRONMENT.
1. Introduction.
2. Environments That Influence the Security Assessment: Threat,Western Values, and the National Critical InfrastructureSectors.
PART II: UNDERSTANDING SECURITY ASSESSMENTS.
3. The Security Assessment: What, Why, And When.
4. A Proven Security Assessment Methodology.
5. Task 1--Project Strategic Planning: Understanding ServiceRequirements.
6. Task 2--Critical Assessment: Understanding the ServiceEnvironment.
7. Task 3--Identify And Characterize Threats to the ServiceEnvironment.
8. Task 4--Evaluate Program Effectiveness.
9. Task 5--Program Analyses.
10. Reporting Security Assessment Results.
PART III: TAILORING THE S³E SECURITYMETHODOLOGY TO SPECIFIC CRITICAL INFRASTRUCTURE SECTORS.
11. The Water Sector.
12. The Energy Sector.
13. The Transportation Sector.
14. The Chemical and Hazardous-Materials Sector.
15. The Agriculture and Food Sector.
16. The Banking and Finance Sector.
17. The Telecomunications Sector.
General Glossary.
Index.




