Critical Infrastructure Resilience and Sustainability Reader
Critical Infrastructure Resilience and Sustainability Reader Identify and protect critical infrastructure from a wide variety of threats In Critical Infrastructure Resilience and Sustainability Reader, Ted G. Lewis delivers a clear and compelling discussion of what infrastructure requires protection...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Newark :
John Wiley & Sons, Incorporated
2023.
|
Edición: | 1st ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009784596606719 |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Contents
- Preface
- Chapter 1 The Challenge
- 1.1 The Evolution of Critical Infrastructure Protection
- 1.1.1 In the Beginning
- 1.1.2 Natural Disaster Recovery
- 1.1.3 What Is Critical?
- 1.1.4 Public-Private Cooperation
- 1.1.5 Federalism: Whole of Government
- 1.2 Defining CIKR Risk and Resilience
- 1.2.1 Risk Strategy
- 1.2.2 Resilience Strategy
- 1.2.3 Sustainability Strategy
- 1.2.4 The Four Horsemen
- 1.3 Weather/Climate Change/Global Warming
- 1.3.1 The Carrington Event
- 1.3.2 Black Bodies
- 1.3.3 The Lightening Rod
- 1.4 Consequences
- 1.4.1 Accidents/Aging/Neglect
- 1.4.2 The Report Card
- 1.4.2.1 The Domino Effect
- 1.4.3 Terrorism/Extremists
- 1.4.4 Cyber Exploits/Criminals
- 1.4.4.1 Black Hats
- 1.4.4.2 Cybercrime Pays
- 1.4.5 The Soft War
- 1.4.6 Cyberattacks and CIKR
- 1.5 Discussion
- References
- Chapter 2 What is a Catastrophe?
- 2.1 Theories of Collapse
- 2.1.1 Normal Accident Theory (NAT)
- 2.1.2 Punctuated Equilibrium Theory (PET)
- 2.1.3 How Uncertain are Avalanches?
- 2.1.4 Self-Organized Criticality
- 2.2 Complex Systems Theory
- 2.2.1 Tragedy of the Commons (TOC)
- 2.2.2 Paradox of Enrichment (POE)
- 2.2.3 Competitive Exclusion Principle (CEP)
- 2.2.4 Paradox of Redundancy (POR)
- 2.3 General Systems Theory
- 2.3.1 Emergence
- 2.3.2 Self-Organization
- 2.3.3 Preferential Attachment
- 2.4 Vulnerable Industrial Commons
- 2.4.1 TOC Failure
- 2.4.2 POE Failure
- 2.4.3 CEP Failure
- 2.4.4 POR Failure
- 2.5 Resilience Versus Sustainability
- 2.5.1 Black Swans
- 2.5.2 Catastrophe's Long Tail
- 2.6 Discussion
- References
- Chapter 3 Energy Transition
- 3.1 A Sector Under Transition
- 3.2 Energy Fundamentals
- 3.2.1 Understanding Units and Measures
- 3.2.2 Consumption
- 3.3 Regulatory Structure of the Energy Sector.
- 3.3.1 Evolution of Energy Sector Regulation
- 3.3.2 Energy Pipeline Regulations
- 3.3.3 The Energy ISAC
- 3.4 Legacy Fuels
- 3.4.1 Coal
- 3.4.2 The Rise of Oil and the Automobile
- 3.4.3 Natural Gas Middlemen
- 3.4.4 Nuclear Fuel
- 3.5 Legacy Energy Infrastructure
- 3.5.1 Oil Refineries
- 3.5.2 Oil Transmission and Distribution
- 3.5.3 Oil Storage
- 3.5.4 The Natural Gas Supply Chain
- 3.5.5 The Critical Gulf of Mexico Cluster
- 3.5.6 Critical Refineries
- 3.5.7 Critical Transmission Pipelines
- 3.6 Renewables
- 3.7 Solar - Photovoltaic (PV)
- 3.7.1 Wind
- 3.7.2 The Hydrogen Circle
- 3.7.3 Others
- 3.8 Batteries and Reservoirs
- 3.8.1 Modern Batteries
- 3.8.2 Grid Scale Storage - LDES
- 3.9 Discussion
- References
- Chapter 4 The Vulnerable Powergrid
- 4.1 What Is the Grid?
- 4.2 The North American Grid
- 4.2.1 Grid Structure
- 4.2.2 ACE and Kirchhoff's Law
- 4.2.3 Anatomy of a Blackout
- 4.3 Threat Analysis
- 4.3.1 Attack Scenario 1: Disruption of Fuel Supply to Power Plants
- 4.3.2 Attack Scenario 2: Destruction of Major Transformers
- 4.3.3 Attack Scenario 3: Disruption of SCADA Communications
- 4.3.4 Attack Scenario 4: Creation of a Cascading Transmission Failure
- 4.4 From Death Rays to Vertical Integration
- 4.4.1 Early Regulation
- 4.4.2 Deregulation and EPACT 1992
- 4.4.3 Electricity Sector ES-ISAC
- 4.5 Out of Orders 888 and 889 Comes Chaos
- 4.5.1 Economics Versus Physics
- 4.5.2 What Increases SOC?
- 4.5.3 NIMBY Versus Environmentalism
- 4.5.4 A Change of Heart
- 4.6 The Architecture of Twenty-First Century Grids
- 4.6.1 The Future Is Storage
- 4.6.2 SOC Is Reduced
- 4.6.3 Economics of Electrification
- 4.7 Discussion
- References
- Chapter 5 Water and Water Treatment
- 5.1 A Vanishing Resource
- 5.1.1 From Germs to Terrorists
- 5.1.2 Safe Drinking Water Act
- 5.1.3 The WaterISAC.
- 5.2 Foundations: SDWA of 1974
- 5.3 The Bio-Terrorism Act of 2002
- 5.3.1 Is Water for Drinking?
- 5.3.2 Climate Change and Rot - The New Threats
- 5.4 The Architecture of Water Systems
- 5.4.1 The Law of the River
- 5.4.2 Resiliency of Water Pipeline Networks
- 5.5 Hetch Hetchy Water
- 5.5.1 Risk Analysis
- 5.5.2 Resilience Analysis
- 5.6 Threat Analysis
- 5.6.1 The Rational Actor
- 5.6.2 Hetch Hetchy Threat Analysis
- 5.6.3 Chem-Bio
- 5.6.4 Earthquakes
- 5.7 Water Resilience
- 5.7.1 Save the Pineapple Express
- 5.7.2 Gray Water
- 5.7.3 Desalination
- 5.7.4 Exemplar Israel
- 5.8 Discussion
- References
- Chapter 6 Transportation Renewed
- 6.1 Transitioning a Vast and Complex Sector
- 6.1.1 Government Leads the Way
- 6.1.2 Safety and Security
- 6.2 Roads at TOC Risk
- 6.2.1 The Road to Prosperity
- 6.2.2 Economic Impact
- 6.2.3 The National Highway System (NHS)
- 6.2.4 The Interstate Highway Network is Resilient
- 6.2.5 The NHS is Safer
- 6.2.6 The Future is Electric
- 6.3 Rail and Railroads
- 6.3.1 Birth of Regulation
- 6.3.2 Freight Trains
- 6.3.3 Passenger Rail
- 6.3.4 Terrorist Target Passenger Trains
- 6.3.5 Economics of Rail
- 6.4 Air Transportation
- 6.4.1 Resilience of the Hub-and-Spoke Network
- 6.4.2 Security of Commercial Air Travel
- 6.4.3 How Safe and Secure is Flying in the United States?
- 6.4.4 Drones
- 6.4.5 eVTOLs
- 6.4.6 Commercial Airline Impact on Global Warming
- 6.5 Discussion
- References
- Chapter 7 Supply Chains
- 7.1 The World is Flat, but Tilted
- 7.1.1 Supply Side Supply
- 7.1.2 The Father of Containerization
- 7.1.3 The Perils of Efficient Supply Chains
- 7.2 The World Trade Web
- 7.2.1 WTW and Economic Contagions
- 7.2.2 Resilience Failures
- 7.3 TWIC
- 7.3.1 MSRAM
- 7.3.2 PROTECT
- 7.4 Sustainable and Resilient Supply Chains
- 7.4.1 Greening of Ships.
- 7.5 Are Supply Chains Secure?
- 7.5.1 Encapsulation Works
- 7.5.2 Who Owns the Trusted Path?
- 7.6 Discussion
- References
- Chapter 8 Communications and the Internet
- 8.1 Early Years
- 8.1.1 The Natural Monopoly
- 8.1.2 The Communications Act of 1996
- 8.2 Regulatory Structure
- 8.2.1 The Most Important Person in Modern History
- 8.2.2 The First (Modern) Critical Infrastructure
- 8.3 The Architecture of the Communications Sector
- 8.3.1 Physical Infrastructure
- 8.3.2 Wireless Networks
- 8.3.3 Extra-Terrestrial Communication
- 8.3.4 Land Earth Stations
- 8.3.5 Cellular Networks
- 8.3.6 Cell Phone Generations
- 8.3.7 Wi-Fi Technology
- 8.4 Risk and Resilience Analysis
- 8.4.1 Importance of Carrier Hotels
- 8.4.2 The Submarine Cable Network
- 8.4.3 HPM Threats
- 8.4.4 Cellular Network Threats
- 8.4.5 Physical Threats
- 8.5 The Monoculture Internet
- 8.5.1 The Internet Self-Organized
- 8.5.2 The Original Sins
- 8.5.2.1 The DNS
- 8.5.2.2 More Original Sin
- 8.5.3 The Hierarchical Internet
- 8.5.4 Too Many Open Ports
- 8.6 Internet Governance
- 8.6.1 IAB and IETF
- 8.6.2 ICANN Wars
- 8.6.3 ISOC
- 8.6.4 W3C
- 8.6.5 Internationalization
- 8.6.6 Regulation and Balkanization
- 8.6.6.1 Rise of Regulation
- 8.6.6.2 Criticality of the Internet
- 8.7 Green Communications
- 8.7.1 Solar Computing
- 8.7.2 Quantum Communications
- 8.7.3 Adiabatic Logic
- 8.8 Discussion
- References
- Chapter 9 Cyber Threats
- 9.1 Threat Surface
- 9.1.1 Script-kiddies
- 9.1.2 Black Hats
- 9.1.3 Weaponized Exploits
- 9.1.4 Ransomware and the NSA
- 9.2 Basic Vulnerabilities
- 9.2.1 The First Exploit
- 9.2.2 TCP/IP Flaws
- 9.2.3 Open Ports
- 9.2.4 Buffer Overflow Exploits
- 9.2.5 DDoS Attacks
- 9.2.6 Email Exploits
- 9.2.7 Flawed Application and System Software
- 9.2.8 Trojans, Worms, Viruses, and Keyloggers.
- 9.2.9 Hacking the DNS
- 9.2.10 Hardware Flaws
- 9.2.11 Botnets
- 9.3 Cyber Risk Analysis
- 9.3.1 Kill Chain Approach
- 9.3.2 Machine-learning Approach
- 9.4 Analysis
- 9.5 Discussion
- References
- Chapter 10 Social Hacking
- 10.1 Web 2.0 and the Social Network
- 10.2 Social Networks Amplify Memes
- 10.3 Topology Matters
- 10.4 Computational Propaganda
- 10.5 Beware the Echo Chamber
- 10.6 Big Data Analytics
- 10.6.1 Algorithmic Bias
- 10.6.2 The Depths of Deep Learning
- 10.6.3 Data Brokers
- 10.7 GDPR
- 10.8 Social Network Resilience
- 10.9 The Sustainable Web
- 10.9.1 The Century of Regulation
- 10.9.2 The NetzDG
- 10.10 Discussion
- References
- Chapter 11 Banking and Finance
- CHAPTER MENU
- 11.1 The Financial System
- 11.1.1 Federal Reserve Versus US Treasury
- 11.1.2 Operating the System
- 11.1.3 Balancing the Balance Sheet
- 11.1.4 Paradox of Enrichment
- 11.2 Financial Networks
- 11.2.1 FedWire
- 11.2.2 TARGET
- 11.2.3 SWIFT
- 11.2.4 Credit Card Networks
- 11.2.5 3-D Secure Payment
- 11.3 Virtual Currency
- 11.3.1 Intermediary PayPal
- 11.3.2 ApplePay
- 11.3.3 Cryptocurrency
- 11.3.3.1 Nakamoto's Revenge
- 11.3.3.2 Double Spend Problem
- 11.3.3.3 Crypto Challenges
- 11.4 Hacking a Financial Network
- 11.5 Hot Money
- 11.5.1 Liquidity Traps
- 11.5.2 The Dutch Disease
- 11.6 The End of Stimulus?
- 11.7 Fractal Markets
- 11.7.1 Efficient Market Hypothesis (EMH)
- 11.7.2 Fractal Market Hypothesis (FMH)
- 11.7.3 Predicting Collapse
- 11.8 The Threat is Existential
- 11.9 Discussion
- References
- Chapter 12 Banking and Finance: Strategies for a Changing World
- 12.1 Whole of Government
- 12.2 Risk and Resilience
- 12.3 Complex and Emergent CIKR
- 12.3.1 Communications and IT
- 12.3.2 Internet and Cybersecurity
- 12.4 Surveillance Capitalism
- 12.5 Industrial Control Systems.
- 12.6 Global Pandemics.