LEADER 05693nam 2200709 450 001 9910825064203321 005 20230803195535.0 010 $a1-61499-357-2 035 $a(CKB)2670000000546625 035 $a(EBL)1637644 035 $a(SSID)ssj0001140628 035 $a(PQKBManifestationID)11638595 035 $a(PQKBTitleCode)TC0001140628 035 $a(PQKBWorkID)11224625 035 $a(PQKB)11742346 035 $a(MiAaPQ)EBC1637644 035 $a(Au-PeEL)EBL1637644 035 $a(CaPaEBR)ebr10843825 035 $a(CaONFJC)MIL577343 035 $a(OCoLC)871190131 035 $a(EXLCZ)992670000000546625 100 $a20140314h20142014 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 00$aCritical infrastructure protection /$fedited by Matthew Edwards, Centre of Excellence-Defence against Terrorism, Ankara, Turkey 210 1$aAmsterdam :$cIOS Press,$d[2014] 210 4$dİ2014 215 $a1 online resource (116 p.) 225 1 $aNATO science for peace and security series. E. Human and societal dynamics,$x1874-6276 ;$vvolume 116 300 $aDescription based upon print version of record. 311 $a1-61499-356-4 320 $aIncludes bibliographical references and index. 327 $a""CRITICAL INFRASTRUCTURE PROTECTION""; ""Preface""; ""Contents""; ""NATO and Critical Infrastructure Resilience a??? Planning for the Unknown""; ""Introduction""; ""1. Environmental Hazards""; ""2. Industrial Accidents""; ""3. Deliberate sabotage and attack""; ""4. Consequential Sabotage""; ""5. Critical Infrastructure and Cybersecurity""; ""6. The 'Unknown Unknowns'""; ""Conclusion""; ""Bibliography""; ""Critical Infrastructure Protection: The EU Perspective""; ""Introduction""; ""1. Background""; ""2. State of Play at the EU Level Regarding CIP""; ""3. Main Features of EPCIP"" 327 $a""4. The Way Ahead: What's Next in 2012?""""Conclusion""; ""Leveraging Partnerships to Better Utilize Declining Resources: The Critical Infrastructure Risk Management Enhancement Initiative""; ""Introduction""; ""1. The Current Challenge""; ""2. The Current Environment for Critical Infrastructure Protection and Resilience""; ""3. The Critical Infrastructure Risk Management Enhancement Initiative (CIRMEI)""; ""4. Managing Risk""; ""5. DHS Critical Infrastructure Regional Initiative""; ""6. CIRMEI in Practice"" 327 $a""7. Responding to the Findings: Regional Resiliency Assessment Program (RRAP) as a Case Study""""8. Tapping the International Community""; ""Conclusion""; ""Bibliography""; ""Critical Infrastructure Protection in a Post-9/11 World""; ""Introduction""; ""1. What Threatens Critical Infrastructure?""; ""2. Post 9/11 CIP a??? A Case Study""; ""Conclusion""; ""Bibliography""; ""Practical Issues Facing Businesses in the Implementation of Critical Infrastructure Protection""; ""Introduction""; ""1. Implementing CIP Protection in Business""; ""2. The Government Dilemma"" 327 $a""3. Private-Public Partnerships""""Conclusion""; ""Critical Infrastructure and Its Impact on Energy Security""; ""Introduction""; ""1. Definition: What does Energy Security Mean?""; ""2. Maximizing Energy Security""; ""Conclusion""; ""Bibliography""; ""Threats to Energy Resources and Infrastructure""; ""Introduction""; ""1. Cyberattack""; ""2. Conventional Warfare""; ""3. Unconventional Warfare""; ""4. Criminal Activity""; ""Conclusion""; ""Bibliography""; ""ANNEX A""; ""Assessing the Terrorist Threat to Critical Energy Infrastructure and Vulnerabilities""; ""Needs and Options for Response"" 327 $a""Opportunities for International Cooperation""""Conclusion""; ""Protecting Pipelines - BTC as a Case Study""; ""Introduction""; ""1. Critical Energy Infrastructure Security""; ""2. Pipelines in Turkey""; ""3. Security Threats against Pipelines""; ""4. BTCa???s Holistic Security Strategy""; ""5. The Way Forward""; ""Conclusion""; ""Bibliography""; ""An Analysis of a Cyberattack on a Nuclear Plant: The STUXNET Worm""; ""Introduction""; ""1. A History of Malware""; ""2. The STUXNET Worm""; ""3. The Impact of STUXNET""; ""Conclusion""; ""Bibliography"" 327 $a""Strategies to Counter Cyberattacks: Cyberthreats and Critical Infrastructure Protection"" 330 $aThe issue of protecting essential infrastructure against the threat of terrorist attack is one which continues to concern governments worldwide. But terrorism is not the only threat this infrastructure may face: environmental hazards, industrial accidents and sabotage are also major concerns. Protecting critical infrastructure is expensive, but many of the solutions apply whatever the cause of the problem, and in these days of scarce resources, multi-sector or multi-threat solutions are preferred. This book presents the proceedings of the NATO Centre of Excellence - Defence against Terrorism 410 0$aNATO science for peace and security series.$nE,$pHuman and societal dynamics ;$vvolume 116. 606 $aInfrastructure (Economics) 606 $aCyberterrorism 606 $aComputer networks$xSecurity measures 606 $aRisk assessment 606 $aEmergency management 615 0$aInfrastructure (Economics) 615 0$aCyberterrorism. 615 0$aComputer networks$xSecurity measures. 615 0$aRisk assessment. 615 0$aEmergency management. 676 $a005.8 702 $aEdwards$b Matthew 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910825064203321 996 $aCritical infrastructure protection$92658893 997 $aUNINA