Critical Infrastructure Resilience and Sustainability Reader

Critical Infrastructure Resilience and Sustainability Reader Identify and protect critical infrastructure from a wide variety of threats In Critical Infrastructure Resilience and Sustainability Reader, Ted G. Lewis delivers a clear and compelling discussion of what infrastructure requires protection...

Descripción completa

Detalles Bibliográficos
Autor principal: Lewis, Ted G. (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Newark : John Wiley & Sons, Incorporated 2023.
Edición:1st ed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009784596606719
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright Page
  • Contents
  • Preface
  • Chapter 1 The Challenge
  • 1.1 The Evolution of Critical Infrastructure Protection
  • 1.1.1 In the Beginning
  • 1.1.2 Natural Disaster Recovery
  • 1.1.3 What Is Critical?
  • 1.1.4 Public-Private Cooperation
  • 1.1.5 Federalism: Whole of Government
  • 1.2 Defining CIKR Risk and Resilience
  • 1.2.1 Risk Strategy
  • 1.2.2 Resilience Strategy
  • 1.2.3 Sustainability Strategy
  • 1.2.4 The Four Horsemen
  • 1.3 Weather/Climate Change/Global Warming
  • 1.3.1 The Carrington Event
  • 1.3.2 Black Bodies
  • 1.3.3 The Lightening Rod
  • 1.4 Consequences
  • 1.4.1 Accidents/Aging/Neglect
  • 1.4.2 The Report Card
  • 1.4.2.1 The Domino Effect
  • 1.4.3 Terrorism/Extremists
  • 1.4.4 Cyber Exploits/Criminals
  • 1.4.4.1 Black Hats
  • 1.4.4.2 Cybercrime Pays
  • 1.4.5 The Soft War
  • 1.4.6 Cyberattacks and CIKR
  • 1.5 Discussion
  • References
  • Chapter 2 What is a Catastrophe?
  • 2.1 Theories of Collapse
  • 2.1.1 Normal Accident Theory (NAT)
  • 2.1.2 Punctuated Equilibrium Theory (PET)
  • 2.1.3 How Uncertain are Avalanches?
  • 2.1.4 Self-Organized Criticality
  • 2.2 Complex Systems Theory
  • 2.2.1 Tragedy of the Commons (TOC)
  • 2.2.2 Paradox of Enrichment (POE)
  • 2.2.3 Competitive Exclusion Principle (CEP)
  • 2.2.4 Paradox of Redundancy (POR)
  • 2.3 General Systems Theory
  • 2.3.1 Emergence
  • 2.3.2 Self-Organization
  • 2.3.3 Preferential Attachment
  • 2.4 Vulnerable Industrial Commons
  • 2.4.1 TOC Failure
  • 2.4.2 POE Failure
  • 2.4.3 CEP Failure
  • 2.4.4 POR Failure
  • 2.5 Resilience Versus Sustainability
  • 2.5.1 Black Swans
  • 2.5.2 Catastrophe's Long Tail
  • 2.6 Discussion
  • References
  • Chapter 3 Energy Transition
  • 3.1 A Sector Under Transition
  • 3.2 Energy Fundamentals
  • 3.2.1 Understanding Units and Measures
  • 3.2.2 Consumption
  • 3.3 Regulatory Structure of the Energy Sector.
  • 3.3.1 Evolution of Energy Sector Regulation
  • 3.3.2 Energy Pipeline Regulations
  • 3.3.3 The Energy ISAC
  • 3.4 Legacy Fuels
  • 3.4.1 Coal
  • 3.4.2 The Rise of Oil and the Automobile
  • 3.4.3 Natural Gas Middlemen
  • 3.4.4 Nuclear Fuel
  • 3.5 Legacy Energy Infrastructure
  • 3.5.1 Oil Refineries
  • 3.5.2 Oil Transmission and Distribution
  • 3.5.3 Oil Storage
  • 3.5.4 The Natural Gas Supply Chain
  • 3.5.5 The Critical Gulf of Mexico Cluster
  • 3.5.6 Critical Refineries
  • 3.5.7 Critical Transmission Pipelines
  • 3.6 Renewables
  • 3.7 Solar - Photovoltaic (PV)
  • 3.7.1 Wind
  • 3.7.2 The Hydrogen Circle
  • 3.7.3 Others
  • 3.8 Batteries and Reservoirs
  • 3.8.1 Modern Batteries
  • 3.8.2 Grid Scale Storage - LDES
  • 3.9 Discussion
  • References
  • Chapter 4 The Vulnerable Powergrid
  • 4.1 What Is the Grid?
  • 4.2 The North American Grid
  • 4.2.1 Grid Structure
  • 4.2.2 ACE and Kirchhoff's Law
  • 4.2.3 Anatomy of a Blackout
  • 4.3 Threat Analysis
  • 4.3.1 Attack Scenario 1: Disruption of Fuel Supply to Power Plants
  • 4.3.2 Attack Scenario 2: Destruction of Major Transformers
  • 4.3.3 Attack Scenario 3: Disruption of SCADA Communications
  • 4.3.4 Attack Scenario 4: Creation of a Cascading Transmission Failure
  • 4.4 From Death Rays to Vertical Integration
  • 4.4.1 Early Regulation
  • 4.4.2 Deregulation and EPACT 1992
  • 4.4.3 Electricity Sector ES-ISAC
  • 4.5 Out of Orders 888 and 889 Comes Chaos
  • 4.5.1 Economics Versus Physics
  • 4.5.2 What Increases SOC?
  • 4.5.3 NIMBY Versus Environmentalism
  • 4.5.4 A Change of Heart
  • 4.6 The Architecture of Twenty-First Century Grids
  • 4.6.1 The Future Is Storage
  • 4.6.2 SOC Is Reduced
  • 4.6.3 Economics of Electrification
  • 4.7 Discussion
  • References
  • Chapter 5 Water and Water Treatment
  • 5.1 A Vanishing Resource
  • 5.1.1 From Germs to Terrorists
  • 5.1.2 Safe Drinking Water Act
  • 5.1.3 The WaterISAC.
  • 5.2 Foundations: SDWA of 1974
  • 5.3 The Bio-Terrorism Act of 2002
  • 5.3.1 Is Water for Drinking?
  • 5.3.2 Climate Change and Rot - The New Threats
  • 5.4 The Architecture of Water Systems
  • 5.4.1 The Law of the River
  • 5.4.2 Resiliency of Water Pipeline Networks
  • 5.5 Hetch Hetchy Water
  • 5.5.1 Risk Analysis
  • 5.5.2 Resilience Analysis
  • 5.6 Threat Analysis
  • 5.6.1 The Rational Actor
  • 5.6.2 Hetch Hetchy Threat Analysis
  • 5.6.3 Chem-Bio
  • 5.6.4 Earthquakes
  • 5.7 Water Resilience
  • 5.7.1 Save the Pineapple Express
  • 5.7.2 Gray Water
  • 5.7.3 Desalination
  • 5.7.4 Exemplar Israel
  • 5.8 Discussion
  • References
  • Chapter 6 Transportation Renewed
  • 6.1 Transitioning a Vast and Complex Sector
  • 6.1.1 Government Leads the Way
  • 6.1.2 Safety and Security
  • 6.2 Roads at TOC Risk
  • 6.2.1 The Road to Prosperity
  • 6.2.2 Economic Impact
  • 6.2.3 The National Highway System (NHS)
  • 6.2.4 The Interstate Highway Network is Resilient
  • 6.2.5 The NHS is Safer
  • 6.2.6 The Future is Electric
  • 6.3 Rail and Railroads
  • 6.3.1 Birth of Regulation
  • 6.3.2 Freight Trains
  • 6.3.3 Passenger Rail
  • 6.3.4 Terrorist Target Passenger Trains
  • 6.3.5 Economics of Rail
  • 6.4 Air Transportation
  • 6.4.1 Resilience of the Hub-and-Spoke Network
  • 6.4.2 Security of Commercial Air Travel
  • 6.4.3 How Safe and Secure is Flying in the United States?
  • 6.4.4 Drones
  • 6.4.5 eVTOLs
  • 6.4.6 Commercial Airline Impact on Global Warming
  • 6.5 Discussion
  • References
  • Chapter 7 Supply Chains
  • 7.1 The World is Flat, but Tilted
  • 7.1.1 Supply Side Supply
  • 7.1.2 The Father of Containerization
  • 7.1.3 The Perils of Efficient Supply Chains
  • 7.2 The World Trade Web
  • 7.2.1 WTW and Economic Contagions
  • 7.2.2 Resilience Failures
  • 7.3 TWIC
  • 7.3.1 MSRAM
  • 7.3.2 PROTECT
  • 7.4 Sustainable and Resilient Supply Chains
  • 7.4.1 Greening of Ships.
  • 7.5 Are Supply Chains Secure?
  • 7.5.1 Encapsulation Works
  • 7.5.2 Who Owns the Trusted Path?
  • 7.6 Discussion
  • References
  • Chapter 8 Communications and the Internet
  • 8.1 Early Years
  • 8.1.1 The Natural Monopoly
  • 8.1.2 The Communications Act of 1996
  • 8.2 Regulatory Structure
  • 8.2.1 The Most Important Person in Modern History
  • 8.2.2 The First (Modern) Critical Infrastructure
  • 8.3 The Architecture of the Communications Sector
  • 8.3.1 Physical Infrastructure
  • 8.3.2 Wireless Networks
  • 8.3.3 Extra-Terrestrial Communication
  • 8.3.4 Land Earth Stations
  • 8.3.5 Cellular Networks
  • 8.3.6 Cell Phone Generations
  • 8.3.7 Wi-Fi Technology
  • 8.4 Risk and Resilience Analysis
  • 8.4.1 Importance of Carrier Hotels
  • 8.4.2 The Submarine Cable Network
  • 8.4.3 HPM Threats
  • 8.4.4 Cellular Network Threats
  • 8.4.5 Physical Threats
  • 8.5 The Monoculture Internet
  • 8.5.1 The Internet Self-Organized
  • 8.5.2 The Original Sins
  • 8.5.2.1 The DNS
  • 8.5.2.2 More Original Sin
  • 8.5.3 The Hierarchical Internet
  • 8.5.4 Too Many Open Ports
  • 8.6 Internet Governance
  • 8.6.1 IAB and IETF
  • 8.6.2 ICANN Wars
  • 8.6.3 ISOC
  • 8.6.4 W3C
  • 8.6.5 Internationalization
  • 8.6.6 Regulation and Balkanization
  • 8.6.6.1 Rise of Regulation
  • 8.6.6.2 Criticality of the Internet
  • 8.7 Green Communications
  • 8.7.1 Solar Computing
  • 8.7.2 Quantum Communications
  • 8.7.3 Adiabatic Logic
  • 8.8 Discussion
  • References
  • Chapter 9 Cyber Threats
  • 9.1 Threat Surface
  • 9.1.1 Script-kiddies
  • 9.1.2 Black Hats
  • 9.1.3 Weaponized Exploits
  • 9.1.4 Ransomware and the NSA
  • 9.2 Basic Vulnerabilities
  • 9.2.1 The First Exploit
  • 9.2.2 TCP/IP Flaws
  • 9.2.3 Open Ports
  • 9.2.4 Buffer Overflow Exploits
  • 9.2.5 DDoS Attacks
  • 9.2.6 Email Exploits
  • 9.2.7 Flawed Application and System Software
  • 9.2.8 Trojans, Worms, Viruses, and Keyloggers.
  • 9.2.9 Hacking the DNS
  • 9.2.10 Hardware Flaws
  • 9.2.11 Botnets
  • 9.3 Cyber Risk Analysis
  • 9.3.1 Kill Chain Approach
  • 9.3.2 Machine-learning Approach
  • 9.4 Analysis
  • 9.5 Discussion
  • References
  • Chapter 10 Social Hacking
  • 10.1 Web 2.0 and the Social Network
  • 10.2 Social Networks Amplify Memes
  • 10.3 Topology Matters
  • 10.4 Computational Propaganda
  • 10.5 Beware the Echo Chamber
  • 10.6 Big Data Analytics
  • 10.6.1 Algorithmic Bias
  • 10.6.2 The Depths of Deep Learning
  • 10.6.3 Data Brokers
  • 10.7 GDPR
  • 10.8 Social Network Resilience
  • 10.9 The Sustainable Web
  • 10.9.1 The Century of Regulation
  • 10.9.2 The NetzDG
  • 10.10 Discussion
  • References
  • Chapter 11 Banking and Finance
  • CHAPTER MENU
  • 11.1 The Financial System
  • 11.1.1 Federal Reserve Versus US Treasury
  • 11.1.2 Operating the System
  • 11.1.3 Balancing the Balance Sheet
  • 11.1.4 Paradox of Enrichment
  • 11.2 Financial Networks
  • 11.2.1 FedWire
  • 11.2.2 TARGET
  • 11.2.3 SWIFT
  • 11.2.4 Credit Card Networks
  • 11.2.5 3-D Secure Payment
  • 11.3 Virtual Currency
  • 11.3.1 Intermediary PayPal
  • 11.3.2 ApplePay
  • 11.3.3 Cryptocurrency
  • 11.3.3.1 Nakamoto's Revenge
  • 11.3.3.2 Double Spend Problem
  • 11.3.3.3 Crypto Challenges
  • 11.4 Hacking a Financial Network
  • 11.5 Hot Money
  • 11.5.1 Liquidity Traps
  • 11.5.2 The Dutch Disease
  • 11.6 The End of Stimulus?
  • 11.7 Fractal Markets
  • 11.7.1 Efficient Market Hypothesis (EMH)
  • 11.7.2 Fractal Market Hypothesis (FMH)
  • 11.7.3 Predicting Collapse
  • 11.8 The Threat is Existential
  • 11.9 Discussion
  • References
  • Chapter 12 Banking and Finance: Strategies for a Changing World
  • 12.1 Whole of Government
  • 12.2 Risk and Resilience
  • 12.3 Complex and Emergent CIKR
  • 12.3.1 Communications and IT
  • 12.3.2 Internet and Cybersecurity
  • 12.4 Surveillance Capitalism
  • 12.5 Industrial Control Systems.
  • 12.6 Global Pandemics.