q...excellent for use as a text in information assurance or cyber-security courses...I strongly advocate that professors...examine this book with the intention of using it in their programs.q (Computing Reviews.com, March 22, 2007) qThe book is written as a student textbook, but it should be equally valuable for current practitioners...this book is a very worthwhile investment.q (Homeland Security Watch, August 17, 2006) While the emphasis is on the development of policies that lead to successful prevention of terrorist attacks on the nationas infrastructure, this book is the first scientific study of critical infrastructures and their protection. The book models the nationas most valuable physical assets and infrastructure sectors as networks of nodes and links. It then analyzes the network to identify vulnerabilities and risks in the sector combining network science, complexity theory, modeling and simulation, and risk analysis. The most critical components become the focus of deeper analysis and protection. This approach reduces the complex problem of protecting water supplies, energy pipelines, telecommunication stations, Internet and Web networks, and power grids to a much simpler problem of protecting a few critical nodes. The new edition incorporates a broader selection of ideas and sectors and moves the mathematical topics into several appendices.13.9 analysis Theoretically, a large power grid can shift power from one end of the country to the other because it can be extremely ... To make matters worse, the SCADA/EMS systems are not sophisticated enough to properly automate the regulation of ACE. ... Enron), the network is vulnerable to technical vulnerabilities (SCADA software errors, complex interdependencies that are not fully understood).
|Title||:||Critical Infrastructure Protection in Homeland Security, Enhanced Edition|
|Author||:||Ted G. Lewis|
|Publisher||:||John Wiley & Sons - 2014-10-13|