LEADER 04768nam 22005535 450 001 9910255293103321 005 20200701144219.0 010 $a3-319-32824-7 024 7 $a10.1007/978-3-319-32824-9 035 $a(CKB)3710000000829542 035 $a(DE-He213)978-3-319-32824-9 035 $a(MiAaPQ)EBC4635862 035 $a(PPN)259473855 035 $a(EXLCZ)993710000000829542 100 $a20160810d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber-Physical Security $eProtecting Critical Infrastructure at the State and Local Level /$fedited by Robert M. Clark, Simon Hakim 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XVIII, 281 p. 32 illus. in color.) 225 1 $aProtecting Critical Infrastructure ;$v3 311 $a3-319-32822-0 320 $aIncludes bibliographical references at the end of each chapters. 327 $aProtecting Critical Infrastructure at the State Provincial and Local Level: Issues in Cyber-Physical Security -- Cybersecurity Terminology and Frameworks -- Assessing Cyber Threats and Solutions for Municipalities -- Cyber Perimeters for Critical Infrastructures -- A Security Evaluation of a Municipal Computer Network: The Case of Collaboration between the City of Pittsburgh and Carnegie Mellon University -- Cyber Risks in the Marine Transportation System -- Creating a Cybersecurity Culture for Your Water/Waste Water Utility -- The Community Cyber Security Maturity Model -- Fighting Cybercrime: A Joint Effort -- Cybersecurity Challenges: The Israeli Water Sector Example -- Efforts to Get People Involved In Cyber-Physical Security: Case Studies of Australia And Singapore -- Cyber Security, Trust-Building and Trust-Management: As Tools for Multi-Agency Cooperation within the Functions Vital To Society An Analysis of the Nature of Spam as Cybercrime -- Securing the Automotive Critical Infrastructure. 330 $aThis book focuses on the vulnerabilities of state and local services to cyber-threats and suggests possible protective action that might be taken against such threats. Cyber-threats to U.S. critical infrastructure are of growing concern to policymakers, managers and consumers. Information and communications technology (ICT) is ubiquitous and many ICT devices and other components are interdependent; therefore, disruption of one component may have a negative, cascading effect on others. Cyber-attacks might include denial of service, theft or manipulation of data. Damage to critical infrastructure through a cyber-based attack could have a significant impact on the national security, the economy, and the livelihood and safety of many individual citizens. Traditionally cyber security has generally been viewed as being focused on higher level threats such as those against the internet or the Federal government. Little attention has been paid to cyber-security at the state and local level. However, these governmental units play a critical role in providing services to local residents and consequently are highly vulnerable to cyber-threats. The failure of these services, such as waste water collection and water supply, transportation, public safety, utility services, and communication services, would pose a great threat to the public. Featuring contributions from leading experts in the field, this volume is intended for state and local government officials and managers, state and Federal officials, academics, and public policy specialists. 410 0$aProtecting Critical Infrastructure ;$v3 606 $aPolitical science 606 $aWater pollution 606 $aTransportation 606 $aPolitical Science$3https://scigraph.springernature.com/ontologies/product-market-codes/911000 606 $aWaste Water Technology / Water Pollution Control / Water Management / Aquatic Pollution$3https://scigraph.springernature.com/ontologies/product-market-codes/U35040 606 $aTransportation$3https://scigraph.springernature.com/ontologies/product-market-codes/119000 615 0$aPolitical science. 615 0$aWater pollution. 615 0$aTransportation. 615 14$aPolitical Science. 615 24$aWaste Water Technology / Water Pollution Control / Water Management / Aquatic Pollution. 615 24$aTransportation. 676 $a320 702 $aClark$b Robert M$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aHakim$b Simon$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910255293103321 996 $aCyber-Physical Security$92177089 997 $aUNINA