Buy Critical Infrastructure Resilience and Sustainability Reader
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Society and Social Sciences > Politics and government > Political activism / Political engagement > Terrorism, armed struggle > Critical Infrastructure Resilience and Sustainability Reader
Critical Infrastructure Resilience and Sustainability Reader

Critical Infrastructure Resilience and Sustainability Reader


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Critical Infrastructure Resilience and Sustainability Reader Identify and protect critical infrastructure from a wide variety of threats In Critical Infrastructure Resilience and Sustainability Reader, Ted G. Lewis delivers a clear and compelling discussion of what infrastructure requires protection, how to protect it, and the consequences of failure. Through the book, you’ll examine the intersection of cybersecurity, climate change, and sustainability as you reconsider and reexamine the resilience of your infrastructure systems. The author walks you through how to conduct accurate risk assessments, make sound investment decisions, and justify your actions to senior executives. You’ll learn how to protect water supplies, energy pipelines, telecommunication stations, power grids, and a wide variety of computer networks, without getting into the weeds of highly technical mathematical models. Critical Infrastructure Resilience and Sustainability Reader also includes: A thorough introduction to the daunting challenges facing infrastructure and the professionals tasked with protecting it Comprehensive explorations of the proliferation of cyber threats, terrorism in the global West, climate change, and financial market volatility Practical discussions of a variety of infrastructure sectors, including how they work, how they’re regulated, and the threats they face Clear graphics, narrative guides, and a conversational style that makes the material easily accessible to non-technical readers Perfect for infrastructure security professionals and security engineering firms, Critical Infrastructure Resilience and Sustainability Reader will also benefit corporate security managers and directors, government actors and regulators, and policing agencies, emergency services, and first responders.

Table of Contents:
Preface THE CHALLENGE               2 1.  The Evolution of Critical Infrastructure Protection       3 1.1. In the Beginning       4 1.2. Natural Disaster Recovery   7 1.3. What is Critical?        11 1.4. Public-private Cooperation 15 1.5. Federalism: Whole of government  17 2.  Defining CIKR Risk and Resilience        20 2.1. Risk Strategy             23 2.2. Resilience Strategy 25 2.3. Sustainability Strategy           28 2.4. The Four Horsemen 31 3. Weather/Climate Change/Global Warming      32 3.1. The Carrington Event             34 3.2. Black Bodies              36 3.3. The Lightening Rod 38 4. Consequences             39 4.1. Accidents/Aging/Neglect     40 4.2.  The Report Card      42 4.2.1.  The Domino Effect             42 4.3. Terrorism/Extremists            43 4.4. Cyber Exploits/Criminals       47 4.4.1. Black Hats               48 4.4.2. Cybercrime Pays  49 4.5. The Soft War              51 4.6. Cyberattacks and CIKR           53 5. Discussion      55   WHAT IS A CATASTROPHE?          2 1. Theories of Collapse   4 1.1. Normal Accident Theory (NAT)          5 1.2. Punctuated Equilibrium Theory (PET)              7 1.3. How Uncertain are Avalanches?        8 2.4. Self-organized Criticality       10 2. Complex Systems Theory        12 2.1 Tragedy of the Commons (TOC)          13 2.2. Paradox of Enrichment (POE)             17 2.3. Competitive Exclusion Principle (CEP)             21 2.4. Paradox of Redundancy (POR)           25 3. General Systems Theory          27 3.1. Emergence 27 3.2. Self-Organization    28 3.3. Preferential Attachment      29 4. Vulnerable Industrial Commons            30 4.1. TOC Failure 32 4.2. POE Failure 32 4.3. CEP Failure 33 4.4. POR Failure 34 5. Resilience vs. Sustainability     34 5.1. Black Swans               35 5.2. Catastrophe’s Long Tail         36 6. Discussion      37   ENERGY TRANSITION      2 1. A Sector Under Transition        2 2.1. Understanding Units and Measures 6 2.2. Consumption            7 3. Regulatory Structure of the Energy Sector        9 3.1. Evolution of Energy Sector Regulation            9 3.2. Energy Pipeline Regulations 10 3.3. The Energy ISAC       12 4. Legacy Fuels  13 4.1. Coal               13 4.2. The Rise of Oil and the Automobile 14 4.3. Natural Gas Middlemen       16 4.4. Nuclear Fuel              18 5. Legacy Energy Infrastructure  21 5.1. Oil Refineries            22 5.2. Oil Transmission and Distribution     24 5.3. Oil Storage 25 5.4. The Natural Gas Supply Chain             28 5.1. Critical Refineries    30 5.2. Critical Transmission Pipelines           31 6. Renewables  33 6.1. Solar – Photovoltaic (PV)      33 6.2. Wind             34 6.3. The Hydrogen Circle               36 6.4. Others         39 7. Batteries and Reservoirs          40 7.1. Modern Batteries    41 7.2. Grid Scale Storage – LDES     42 8. Discussion      43   THE VULNERABLE POWERGRID  1 1. What is the Grid?        5 2. The North American Grid         8 2.1. Grid Structure           10 2.2. ACE and Kirchhoff’s Law       13 2.3. Anatomy of a Blackout          14 3. Threat Analysis             19 3.1. Attack Scenario 1:  Disruption of fuel supply to power plants                19 3.2. Attack Scenario 2:  Destruction of major transformers            20 3.3. Attack Scenario 3:  Disruption of SCADA communications      23 3.4 Attack Scenario 4:  Creation of a cascading transmission failure            24 4. From Death Rays to Vertical Integration            26 4.1. Early Regulation       29 4.2. Deregulation and EPACT 1992             32 4.3. Energy Sector ISAC 34 5. Out of Orders 888 and 889 Comes Chaos          37 5.1. Economics Versus Physics    41 5.2. What Increases SOC?             44 5.3. A Change of Heart   48 6. The Architecture of 21st Century Grids              49 6.1.  The Future is Storage            51 6.2. SOC is Reduced        54 6.3.  Economics of Electrification               57 7. Discussion      60   WATER AND WATER TREATMENT              2 1. A Vanishing Resource 2 1.1. From Germs to Terrorists     5 1.2. Safe Drinking Water Act        6 1.3. The WaterISAC         8 2.  Foundations: SDWA of 1974   9 3. The Bio-terrorism Act of 2002 11 3.1. Is Water for Drinking?            12 3.2. Climate Change and Rot – the New Threats  15 4. The Architecture of Water Systems     18 4.1. The Law of the River               20 4.2. Resiliency of Water Pipeline Networks           21 5. Hetch Hetchy Water  23 5.1. Risk Analysis              26 5.2. Resilience Analysis  26 6. Threat Analysis             27 6.1. The Rational Actor  28 6.2. Hetch Hetchy Threat Analysis             29 6.3. Chem-Bio   30 6.4. Earthquakes              32 7. Water Resilience         33 7.1. Save the Pineapple Express 34 7.2. Grey Water 36 7.3. Desalination              37 7.4. Exemplar Israel         38 8. Discussion      39   TRANSPORTATION RENEWED     2 1. Transitioning a Vast and Complex Sector           2 1.1.   Government Leads the Way             4 1.2. Safety and Security 5 2. Roads at TOC Risk        8 2.1. The Road to Prosperity         13 2.2. Economic Impact     14 2.3. The National Highway System (NHS)               16 2.4. The Interstate Highway Network is Resilient 18 2.5. The NHS is Safer       19 2.6. The Future is Electric              21 3. Rail and Railroads        22 3.1. Birth of Regulation  25 3.2. Freight Trains            29 3.3. Passenger Rail           30 3.4. Terrorist Target Passenger Trains     32 3.5. Economics of Rail     34 4. Air Transportation      36 4.1. Resilience of the Hub-and-Spoke Network   41 4.2. Security of Commercial Air Travel     43 4.3. How Safe and Secure is Flying in the US?       47 4.4. Drones         48 4.5. eVTOLs        49 4.6. Commercial Airline Impact on Global Warming           49 5. Discussion      50   SUPPLY CHAINS 1 1. The World Is Flat, But Tilted    7 1.1. Supply Side Supply  10 1.2. The Father of Containerization          11 1.3. The Perils of Efficient Supply Chains 13 2. The World Trade Web               18 2.1. WTW and Economic Contagions        19 2.2. Resilience Failures   21 3. TWIC 25 3.1. MSRAM       26 3.2. PROTECT     30 4. Sustainable and Resilient Supply Chains             31 5. Are Supply Chains Secure?      33 5.1. Encapsulation Works             35 5.2. Who Owns the Trusted Path?             36 6. Discussion      37   COMMUNICATIONS AND THE INTERNET 2 1. Early Years     5 1.1. The Natural Monopoly          9 1.2. The Communications Act of 1996      12 2. Regulatory Structure 14 2.1. The Most Important Person in Modern History           15 2.2. The First (Modern) Critical Infrastructure      16 3. The Architecture of the Communications Sector            21 3.1. Physical Infrastructure          21 3.2. Wireless Networks 24 3.3. Extra-terrestrial Communication       26 3.4. Land Earth Stations 30 3.5. Cellular Networks   31 3.6. Cell Phone Generations        34 3.7. Wi-Fi Technology     35 4. Risk and Resilience Analysis    37 4.1. Importance of Carrier Hotels              39 4.2. The Submarine Cable Network          41 4.3. HPM Threats             43 4.4. Cellular Network Threats     45 4.5. Physical Threats       49 5. The Monoculture Internet      49 5.1. The Internet Self-organized 52 5.2. The Original Sins      55 5.2.1. The DNS   58 5.2.2. More Original Sin 60 5.3. The Hierarchical Internet     62 5.4. Too Many Open Ports            65 6. Internet Governance 66 6.1. IAB and IETF               67 6.2. ICANN Wars               71 6.3. ISOC              74 6.4. W3C              75 6.5. Internationalization 77 6.6. Regulation and Balkanization              79 6.6.1. Rise of Regulation                81 6.6.2. Criticality of the Internet  83 7.  Green Communications          84 7.1. Solar Computing      84 7.2. Quantum Communications 85 7.3. Adiabatic Logic          86 8. Discussion      87   CYBER THREATS 1 1. Threat surface              8 1.1. Script-kiddies            14 1.2. Black Hats   16 1.3. Weaponized Exploits             16 1.4. Ransomware and the NSA   19 2. Basic Vulnerabilities   22 2.1. The First Exploit       25 2.2. TCP/IP Flaws              29 2.3. Open Ports 33 2.4. Buffer Overflow Exploits      35 2.5. DDoS Attacks            37 2.6. Email Exploits            38 2.7. Flawed Application and System Software     39 2.8. Trojans, Worms, Viruses, and Keyloggers      42 2.9. Hacking the DNS      44 2.10. Hardware Flaws     46 2.11. Botnets     49 3. Cyber Risk Analysis     52 3.1. Kill Chain Approach 53 3.2. Machine-learning Approach 55 4. Analysis           57 5. Discussion      59   SOCIAL HACKING             1 1. Web 2.0 and the Social Network          5 2. Social Networks Amplify Memes          10 3. Topology Matters       13 4. Computational Propaganda    15 5. Beware the Echo Chamber      18 6. Big Data Analytics        20 6.1. Algorithmic Bias       23 6.2. The Depths of Deep Learning             24 6.3. Data Brokers             25 7. GDPR               26 8. Social Network Resilience        30 9. The Sustainable Web 32 9.1. The Century of Regulation   33 9.2. The NetzDG               34 10. Discussion    37   BANKING AND FINANCE 2 1. The Financial System 10 1.1. Federal Reserve vs. US Treasury        12 1.2. Operating the System            13 1.3. Balancing the Balance Sheet               15 1.4. Paradox of Enrichment          18 2. Financial Networks     19 2.1. FedWire      20 2.2. TARGET       22 2.3. SWIFT           24 2.4. Credit Card Networks            26 2.5. 3-D Secure Payment              27 3. Virtual Currency          29 3.1. Intermediary PayPal               30 3.2. ApplePay    31 3.3. Cryptocurrency        32 3.3.1. Nakamoto’s Revenge         34 3.3.2. Double Spend Problem     35 3.3.3. Crypto Challenges               39 4. Hacking a Financial Network  43 5. Hot Money    45 5.1. Liquidity Traps          46 5.2. The Dutch Disease  49 6. The End of Stimulus? 51 7. Fractal Markets            52 7.1. Efficient Market Hypothesis (EMH)  53 7.2. Fractal Market Hypothesis (FMH)     55 7.3. Predicting Collapse 56 8. The Threat is Existential            58 9. Discussion      59   STRATEGIES FOR A CHANGING WORLD   1 1. Whole of Government              5 2. Risk and Resilience     8 3. Complex and Emergent CIKR  12 3.1. Communications and IT         13 3.2. Internet and Cybersecurity 15 4. Surveillance Capitalism             17 5. Industrial Control Systems      19 6. Global Pandemics       22 7. Transportation and Supply Chains        23 8. Banking and Finance  25 9. Discussion      27

About the Author :
Ted G. Lewis is an author, speaker, and computer scientist with expertise in applied complexity theory, homeland security, infrastructure systems, and early-stage startup strategies. He is a member of the Oregon State University Engineering Hall of Fame and has held high-ranking positions in government, industry, and academia over his lengthy career.


Best Sellers


Product Details
  • ISBN-13: 9781394179534
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Language: English
  • ISBN-10: 1394179537
  • Publisher Date: 28 Aug 2023
  • Binding: Digital (delivered electronically)
  • No of Pages: 288


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Critical Infrastructure Resilience and Sustainability Reader
John Wiley & Sons Inc -
Critical Infrastructure Resilience and Sustainability Reader
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Critical Infrastructure Resilience and Sustainability Reader

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!