LEADER 11667nam 22005053 450 001 9911006655603321 005 20250910135226.0 010 $a9780323954082$b(electronic bk.) 010 $z9780323954099 035 $a(MiAaPQ)EBC31354283 035 $a(Au-PeEL)EBL31354283 035 $a(CKB)32154701500041 035 $a(Exl-AI)31354283 035 $a(EXLCZ)9932154701500041 100 $a20240528d2024 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecuring integrated transportation networks 205 $a1st ed. 210 1$aSan Diego :$cElsevier,$d2024. 210 4$dİ2024. 215 $a1 online resource (436 pages) 311 08$aPrint version: Gordon, Gary A. Securing Integrated Transportation Networks San Diego : Elsevier,c2024 9780323954099 327 $aFront Cover -- SECURING INTEGRATED TRANSPORTATION NETWORKS -- SECURING INTEGRATED TRANSPORTATION NETWORKS -- Copyright -- Contents -- Foreword -- Acknowledgments -- I - The evolution of transportation security -- 1 - Overview of transportation and why we want to secure it? -- Prologue -- 1.1 What is transportation? -- 1.2 Freight transportation -- 1.2.1 International transportation -- 1.3 Moving people -- 1.4 Components of transportation -- 1.4.1 Rights of way -- 1.4.2 Vehicles -- 1.5 What is transportation infrastructure? -- 1.5.1 Infrastructure and operations -- 1.5.2 Scheduling: How it shapes operations -- 1.5.3 How operations shape it -- 1.5.4 Unique challenges of infrastructure -- 1.5.4.1 Useful life -- 1.5.4.2 Financial concerns -- 1.5.4.3 Safety and security -- 1.6 Evolution of transportation modes -- 1.7 Cybersystem dependence -- 1.8 Threats and vulnerabilities overview -- 1.8.1 Natural disasters -- 1.8.2 Manmade disasters -- 1.8.3 Combined threats -- 1.9 Securing transportation infrastructure and operations -- 1.9.1 Human impact (movement of people) -- 1.9.2 Economic impact (movement of goods) -- References -- 2 - Transportation security before and after 9/11 -- 2.1 Introduction -- 2.2 Transportation security: A little history -- 2.3 Protecting the railroads -- 2.3.1 Railroads in wartime -- 2.4 Shifts in modal preferences -- 2.5 Intermodalism -- 2.6 Protecting transportation infrastructure -- 2.6.1 Historical development -- 2.6.2 Terrorism and changing international trade forever -- 2.7 Enhancing initiatives with cross-sector alliances -- 2.7.1 Alliances, both public and private -- 2.7.2 Internationalization of trade alliances -- 2.7.3 Private-private alliances -- 2.8 Summary -- References -- 3 - Federal agencies-Regulation and the promotion of economic growth -- 3.1 Introduction -- 3.2 A complex evolution. 327 $a3.3 Railroads: Where it all began -- 3.3.1 Economic regulation -- 3.3.2 Safety regulation -- 3.3.3 Security regulation -- 3.4 Motor carriers: Protecting a nascent industry -- 3.4.1 Promoting highways -- 3.4.2 Economic regulation -- 3.4.3 Safety regulation -- 3.4.4 Security regulation -- 3.5 Transit: A formerly embedded activity -- 3.5.1 Deemphasizing the automobile -- 3.5.2 Safety regulation -- 3.5.3 Security regulation -- 3.6 Aviation: Bifurcation of economic and safety regulations -- 3.6.1 Economic regulation -- 3.6.2 Safety regulation -- 3.6.3 Security regulation -- 3.7 Ocean maritime shipping -- 3.7.1 Promotion of seaborne commerce -- 3.7.2 Economic regulation -- 3.7.3 Safety regulation -- 3.7.4 Security regulation -- 3.8 Inland maritime shipping -- 3.8.1 Economic regulation -- 3.8.2 Safety regulation -- 3.8.3 Security regulation -- 3.9 Pipelines -- 3.9.1 Economic regulation -- 3.9.2 Safety regulation -- 3.9.3 Security regulation -- 3.10 Let's not forget intermodal -- 3.11 Sorting out the federal agencies -- 3.12 Summary -- Appendix A: Compendium of federal transportation-related legislation-1800s -- Appendix B: Compendium of federal transportation-related legislation-1900-1950 -- Appendix C: Compendium of federal transportation-related legislation-1951-2000 -- Appendix D: Compendium of federal transportation-related legislation-2000+ -- References -- 4 - Who are the parties involved and what are their relationships?? -- 4.1 Introduction -- 4.1.1 Case scenario -- 4.2 Modal partners -- 4.2.1 Aviation -- 4.2.2 Bus and rail transit -- 4.2.3 Freight and passenger rail -- 4.2.4 Highway and motor carriers -- 4.2.4.1 Infrastructure ownership -- 4.2.5 Intermodal -- 4.2.6 Maritime -- 4.2.7 Pipelines -- 4.3 Cooperative and partnered security programs and initiatives -- 4.3.1 Cross-sector dependencies -- 4.3.2 Chemical sector. 327 $a4.3.3 Transportation dependencies -- 4.3.4 Visible Intermodal Prevention and Response -- 4.3.5 Container Security Initiative -- 4.3.6 Certified Cargo Screening Program -- 4.3.7 Customs Trade Partnership Against Terrorism -- 4.3.8 Private and public sector cooperation -- 4.4 Summary -- References -- 5 - Components and economics of transportation security -- 5.1 Introduction -- 5.1.1 Derived demand -- 5.1.2 Dual production -- 5.1.3 Spatial and temporal utility -- 5.1.4 Transit time -- 5.1.5 Complexity -- 5.1.6 A primer on protection -- 5.2 The nature of transportation infrastructure -- 5.2.1 Infrastructure specifics -- 5.3 Analysis of benefits -- 5.4 Dictated infrastructure -- 5.5 Safety and security -- 5.6 Transit time -- 5.7 Economic effects and goods -- 5.8 Total cost of ownership: Initial costs and ongoing maintenance expenses -- 5.9 Asset utilization -- 5.10 Mutual aid -- 5.11 Intermodal operations -- 5.12 Adding protective assets -- 5.13 The problem of scale -- 5.14 Determining probability -- 5.15 Summary -- References -- Suggested additional reference materials -- II - Exposure -- 6 - Nature of transported people and goods -- 6.1 Introduction -- 6.2 Transporting people -- 6.2.1 Transporting for employment -- 6.2.2 Transporting for nonvocational commercial activity -- 6.2.3 Transporting for social purposes -- 6.2.4 Transporting for and as entertainment -- 6.2.5 Secondary incidental purposes -- 6.3 Freight -- 6.3.1 Finished products -- 6.3.2 Semifinished products -- 6.3.3 Refined materials -- 6.3.4 Basic materials -- 6.4 Modal attributes -- 6.4.1 Accessibility -- 6.4.2 Capability -- 6.4.3 Ease of arrangement -- 6.4.4 Transit time -- 6.4.5 Reliability -- 6.4.6 Price and cost -- 6.4.7 Security -- 6.5 Security concerns according to supply chain tier -- 6.6 Summary -- References -- 7 - Threats, vulnerabilities, consequences, and risks. 327 $a7.1 Introduction -- 7.2 Definitions -- 7.2.1 Threats -- 7.2.1.1 Multiple threats -- 7.2.1.2 Scope -- 7.2.2 Vulnerabilities -- 7.2.3 Consequences -- 7.2.4 Risk -- 7.3 Transportation infrastructure -- 7.3.1 Railroads -- 7.3.1.1 Rights-of-way -- 7.3.1.2 Train robbery -- 7.3.1.3 Stations and terminals -- 7.3.1.4 Hazmat-loaded railcars -- 7.3.1.5 Explosive devices -- 7.3.1.6 Maintenance facilities -- 7.3.1.7 Cyberattacks -- 7.3.2 Motor carriers -- 7.3.2.1 Hijacking and cargo theft -- 7.3.2.2 Transporting illegal cargo -- 7.3.2.3 Destruction of vehicles -- 7.3.3 Ocean maritime -- 7.3.3.1 Cyberthreats -- 7.3.3.2 Hijacking and piracy (risks at sea) -- 7.3.3.3 Compromised cargo -- 7.3.3.4 Malfunctioning navigational systems -- 7.3.3.5 Risks in port -- 7.3.4 Inland maritime -- 7.3.5 Aviation -- 7.3.5.1 Passenger terminals -- 7.3.5.2 Airfreight -- 7.3.5.3 Aircraft -- 7.3.5.4 Cyberattacks -- 7.3.6 Pipelines -- 7.3.6.1 Rights-of-way -- 7.3.6.2 Storage facilities -- 7.3.6.3 Cyberattacks -- 7.3.7 Transit -- 7.3.7.1 Passengers -- 7.3.7.2 Vehicles -- 7.3.7.3 Transit personnel -- 7.3.7.4 Cyberattacks -- 7.3.8 Let's not forget intermodal -- 7.4 Summary -- References -- 8 - Natural versus manmade disasters -- 8.1 Introduction -- 8.2 All-hazards Approach -- 8.3 Developing a common lexicon -- 8.4 Phases of emergencies or incidents1 -- 8.4.1 Planning -- 8.4.2 Preparedness -- 8.4.3 Transition from preparedness to response -- 8.4.4 Response -- 8.4.5 Recovery -- 8.4.6 Mitigation -- 8.5 Agencies -- 8.5.1 Federal government agencies -- 8.5.2 State, territorial, and local government agencies -- 8.6 Stakeholders -- 8.7 What should transportation organizations and stakeholders do? -- 8.7.1 Planning -- 8.7.2 Preparedness -- 8.7.3 Response -- 8.7.4 Recovery -- 8.7.5 Mitigation -- 8.8 Continuous preparedness -- 8.9 Summary -- Appendix A: Short glossary of emergency management terms. 327 $aReferences -- 9 - Assessing risk -- 9.1 Introduction -- 9.2 What are the risks to transportation systems? -- 9.2.1 Railroads -- 9.2.2 Transit -- 9.2.3 Highway/motor carriers -- 9.2.4 Pipelines -- 9.2.5 Aviation -- 9.2.6 Maritime operations -- 9.3 Assessing risk -- 9.3.1 Qualitatively assessing risk -- 9.3.1.1 Modified CARVER model -- 9.3.2 Quantitatively assessing risk -- 9.3.2.1 Blue Ribbon panel method -- 9.3.2.2 TSA risk management analysis tool -- 9.3.2.3 Rail corridor risk assessment system -- 9.3.2.4 Maritime security risk assessment method -- 9.3.2.5 Pipeline risk assessment models -- 9.3.2.6 Transit risk assessments -- 9.3.2.7 Risk assessment similarities and differences -- 9.4 Future assessment needs -- References -- 10 - Cyber threats and risks -- 10.1 Introduction to cybersecurity threats and transportation -- 10.1.1 Overview -- 10.1.2 Outsider versus insider threats -- 10.1.3 What are the objectives? -- 10.2 How we got to where we are -- 10.2.1 Some working definitions -- 10.2.2 IT and OT convergence -- 10.3 Modal-specific IT and OT systems -- 10.3.1 Aviation -- 10.3.1.1 Segment overview -- 10.3.1.2 Some key risks and vulnerabilities -- 10.3.2 Maritime transportation -- 10.3.2.1 Seagoing maritime transportation -- 10.3.2.2 Cyber risk for seagoing maritime transportation -- 10.3.2.3 Inland maritime transportation -- 10.3.2.4 Cyber risk for inland maritime transportation -- 10.3.3 Railroad transportation -- 10.3.3.1 Cyber risk for railroad transportation -- 10.3.4 Highway transportation -- 10.3.4.1 Cyber risk for highway transportation -- 10.3.5 Rail and bus transit -- 10.3.6 Pipeline transportation -- 10.3.6.1 Cyber risk for pipeline transportation -- 10.4 Common threads means common threats -- 10.5 Generic means of protecting from cyberattacks -- 10.5.1 Cybersecurity policies -- 10.5.2 Early detection processes. 327 $a10.5.3 Responses to cyberattack. 330 $aThis book, 'Securing Integrated Networks,' delves into the complexities of ensuring security across various transportation networks, including freight, passenger, and intermodal systems. Authored by experts in civil and environmental engineering and business, it examines the evolution of security practices, particularly post-9/11, highlighting the interconnectedness of cybersystems and physical security measures. The text covers a wide array of topics such as federal regulations, the role of different transportation modes, and the threats they face. It emphasizes the importance of collaboration between public and private sectors and the need for continuous preparedness against both natural and manmade disasters. The book is intended for professionals and researchers in transportation security, providing insights into best practices and emerging challenges in the field.$7Generated by AI. 606 $aTransportation$7Generated by AI 606 $aComputer security$7Generated by AI 615 0$aTransportation 615 0$aComputer security 700 $aGordon$b Gary A$012299 701 $aYoung$b Richard R.$f1946-$01846149 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9911006655603321 996 $aSecuring integrated transportation networks$94430252 997 $aUNINA LEADER 00597nam 2200241zu 450 001 9911034457303321 005 20241212213412.0 010 $a9788866771999 010 $a8866771996 035 $a(CKB)36956705600041 035 $a(EXLCZ)9936956705600041 100 $a20241212|2009uuuu || | 101 0 $aeng 135 $aur||||||||||| 200 10$aPensiero altro 210 $cArmando$d2009 311 08$a9788860814036 311 08$a8860814030 700 $aTouraine$b Alain, 1925-$050969 906 $aBOOK 912 $a9911034457303321 996 $aPensiero altro$9248469 997 $aUNINA