National infrastructure [[electronic resource] ] : protecting, funding, and rebuilding / / Frederick H. Lupul, editor |
Pubbl/distr/stampa | New York, : Nova Science Publishers, c2009 |
Descrizione fisica | 1 online resource (256 p.) |
Disciplina | 363.325/170973 |
Altri autori (Persone) | LupulFrederick H |
Collana | Terrorism, hot spots and conflict-related issues |
Soggetto topico |
Terrorism - United States - Prevention
Infrastructure (Economics) - Security measures - United States - Planning National security - United States - Planning |
Soggetto genere / forma | Electronic books. |
ISBN | 1-61470-344-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910461459303321 |
New York, : Nova Science Publishers, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
National infrastructure [[electronic resource] ] : protecting, funding, and rebuilding / / Frederick H. Lupul, editor |
Pubbl/distr/stampa | New York, : Nova Science Publishers, c2009 |
Descrizione fisica | 1 online resource (256 p.) |
Disciplina | 363.325/170973 |
Altri autori (Persone) | LupulFrederick H |
Collana | Terrorism, hot spots and conflict-related issues |
Soggetto topico |
Terrorism - United States - Prevention
Infrastructure (Economics) - Security measures - United States - Planning National security - United States - Planning |
ISBN | 1-61470-344-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910789746103321 |
New York, : Nova Science Publishers, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
National infrastructure : protecting, funding, and rebuilding / / Frederick H. Lupul, editor |
Edizione | [1st ed.] |
Pubbl/distr/stampa | New York, : Nova Science Publishers, c2009 |
Descrizione fisica | 1 online resource (256 p.) |
Disciplina | 363.325/170973 |
Altri autori (Persone) | LupulFrederick H |
Collana | Terrorism, hot spots and conflict-related issues |
Soggetto topico |
Terrorism - United States - Prevention
Infrastructure (Economics) - Security measures - United States - Planning National security - United States - Planning |
ISBN | 1-61470-344-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- NATIONAL INFRASTRUCTURE:PROTECTING, FUNDING ANDREBUILDING -- NATIONAL INFRASTRUCTURE:PROTECTING, FUNDING ANDREBUILDING -- CONTENTS -- LIST OF FIGURES AND TABLES -- PREFACE∗ -- LETTER OF AGREEMENT -- SIGNATORIES -- EXECUTIVE SUMMARY -- 1. INTRODUCTION -- 2. AUTHORITIES, ROLES, AND RESPONSIBILITIES -- 3. THE CI/KR PROTECTION PROGRAM STRATEGY: MANAGING RISK -- 4. ORGANIZING AND PARTNERING FOR CI/KR PROTECTION -- 5. CI/KR PROTECTION: AN INTEGRAL PART OF THE HOMELANDSECURITY MISSION -- 6. ENSURING AN EFFECTIVE, EFFICIENT PROGRAMOVER THE LONG TERM -- 7. PROVIDING RESOURCES FOR THE CI/KR PROTECTION PROGRAM -- Chapter 11. INTRODUCTION -- 1.1. PURPOSE -- 1.2. SCOPE -- 1.3. APPLICABILITY -- 1.3.1. Goal -- 1.3.2. The Value Proposition -- 1.4. THREATS TO THE NATION'S CI/KR -- 1.4.1. The Vulnerability of the U.S. Infrastructure to 21st Century Threats -- 1.4.2. The Nature of Possible Terrorist Attacks -- 1.5. ALL-HAZARDS AND CI/KR PROTECTION -- 1.6. PLANNING ASSUMPTIONS -- 1.6.1. Sector-Specific Nature of CI/KR Protection -- 1.6.2. Cross-Sector Dependencies and Interdependencies -- 1.6.3. Adaptive Nature of the Terrorist Threat -- 1.6.4. All-Hazards Nature of CI/KR Protection -- 1.7. SPECIAL CONSIDERATIONS -- 1.7.1 Protection of Sensitive Information -- 1.7.2. The Cyber Dimension -- 1.7.3. The Human Element -- 1.7.4. International CI/KR Protection -- 1.8. ACHIEVING THE GOAL OF THE NIPP -- 1.8.1. Understanding and Sharing Information -- 1.8.2. Building Security Partnerships -- 1.8.3. Implementing a Long-Term CI/KR Risk Management Program -- 1.8.4. Maximizing Efficient Use of Resources for CI/KR Protection -- Chapter 22.AUTHORITIES, ROLES, AND RESPONSIBILITIES -- 2.1. AUTHORITIES -- 2.2. ROLES AND RESPONSIBILITIES -- 2.2.1. Department of Homeland Security -- 2.2.2. Sector-Specific Agencies -- 2.2.3. Other Federal Departments, Agencies, and Offices.
2.2.4. State, Local, and Tribal Governments -- 2.2.4.1. State and Territorial Governments -- 2.2.4.2. Local Governments -- 2.2.4.3. Tribal Governments -- 2.2.4.4. Regional Partners -- 2.2.4.5 Boards, Commissions, Authorities, Councils, and Other Entities -- 2.2.5. Private Sector Owners and Operators -- 2.2.6. Advisory Councils -- 2.2.7. Academia and Research Centers -- Chapter 33. THE PROTECTION PROGRAM STRATEGY:MANAGING RISK -- 3.1. SET SECURITY GOALS -- 3.2. IDENTIFY ASSETS, SYSTEMS, NETWORKS, AND FUNCTIONS -- 3.2.1. National Infrastructure Inventory -- 3.2.2. Protecting and Accessing Inventory Information -- 3.2.3. SSA Roles in Inventory Development and Maintenance -- 3.2.4. State Roles in Inventory Development and Maintenance -- 3.2.5. Identifying Cyber Infrastructure -- 3.2.6. Identifying Positioning, Navigation, and Timing Services -- 3.3. ASSESS RISKS -- 3.3.1. NIPP Baseline Criteria for Assessment Methodologies -- 3.3.1.1. Ensuring That Previous Assessments Can Be Used -- 3.3.1.2. Baseline Criteria -- 3.3.2. Consequence Analysis -- 3.3.2.1. Consequence Assessment Methodologies That Enable National Risk Analysis -- 3.3.2.2. Consequence Screening -- 3.3.3. Vulnerability Assessment -- 3.3.3.1. Vulnerability Assessment Methodologies That Enable National Risk Analysis -- 3.3.3.2. SSA and DHS Analysis Responsibilities -- 3.3.4. Threat Analysis -- 3.3.4.1 Key Aspects of the Terrorist Threat to CI/KR -- 3.3.4.2. Homeland Infrastructure Threat and Risk Analysis Center -- 3.4. PRIORITIZE -- 3.4.1. The Prioritization Process -- 3.4.2. Tailoring Prioritization Approaches to Sector Needs -- 3.4.3. The Uses of Prioritization -- 3.5. IMPLEMENT PROTECTIVE PROGRAMS -- 3.5.1. Protective Actions -- 3.5.2. Characteristics of Effective Protective Programs -- 3.5.3. Protective Programs, Initiatives, and Reports -- 3.6.MEASURE EFFECTIVENESS. 3.6.1. NIPP Metrics and Measures -- 3.6.1.1. Measuring Performance -- 3.6.1.2. Core Metrics and Sector-Specific Metrics -- 3.6.2. Gathering Performance Information -- 3.6.3. Assessing Performance and Reporting on Progress -- 3.7. USING METRICS AND PERFORMANCE MEASUREMENT FORCONTINUOUS IMPROVEMENT -- Chapter 44. ORGANIZING AND PARTNERING FOR CI/KR PROTECTION -- 4.1. LEADERSHIP AND COORDINATION MECHANISMS -- 4.1.1. National-Level Coordination -- 4.1.2. Sector Partnership Coordination -- 4.1.2.1. Private Sector Cross-Sector Council -- 4.1.2.2. Government Cross-Sector Council -- 4.1.2.3. Sector Coordinating Councils -- 4.1.2.4. Government Coordinating Councils -- 4.1.2.5. Critical Infrastructure Partnership Advisory Council -- 4.1.3. Regional Coordination and the Partnership Model -- 4.1.4. International CI/KR Protection Cooperation -- 4.1.4.1. Cooperation with International Security Partners -- 4.1.4.2. Implementing Current Agreements -- 4.1.4.3. Approach to International Cyber Security -- 4.1.4.4. Foreign Investment in CI/KR -- 4.2. INFORMATION SHARING: A NETWORK APPROACH -- 4.2.1. Information Sharing between NIPP Security Partners -- 4.2.2. Information-Sharing Life Cycle -- 4.2.2.1. Information Requirement -- 4.2.2.2. Balancing the Sharing and Protection of Information -- 4.2.2.3. Top-Down and Bottom-Up Sharing -- 4.2.2.4. Decisions and Actions -- 4.2.3. The Information-Sharing Approach -- 4.2.3.1. Information Sharing With HSIN -- 4.2.4. The Federal Intelligence Node -- 4.2.5. The Federal Infrastructure Node -- 4.2.6. State, Local, Tribal, and Regional Node -- 4.2.7. Private Sector Node -- 4.2.8. DHS Operations Node -- 4.2.8.1. National Operations Center [21] -- 4.2.8.2. National Coordinating Center for Telecommunications -- 4.2.8.3. United States Computer Emergency Readiness Team -- 4.2.9. Other Information-Sharing Nodes. 4.3. PROTECTION OF SENSITIVE CI/KR INFORMATION -- 4.3.1. Protected Critical Infrastructure Information Program -- 4.3.1.1. PCII Program Office -- 4.3.1.2. Critical Infrastructure Information Protection -- 4.3.1.3. Uses of PCII -- 4.3.1.4. PCII Protections and Authorized Users -- 4.3.2. Other Information Protection Protocols -- 4.3.2.1. Sensitive Security Information -- 4.3.2.2. Unclassified Controlled Nuclear Information -- 4.3.2.3. Freedom of Information Act Exemptions and Exclusions -- 4.3.2.4. Classified Information -- 4.3.2.5. Physical and Cyber Security Measures -- 4.4. PRIVACY AND CONSTITUTIONAL FREEDOMS -- Chapter 55. INTEGRATING CI/KR PROTECTION AS PART OF THE HOMELAND SECURITY MISSION -- 5.1. A COORDINATED NATIONAL APPROACHTO THE HOMELAND SECURITY MISSION -- 5.1.1. Legislation -- 5.1.2. Strategies -- 5.1.2.1. The National Strategy for Homeland Security -- 5.1.2.2. The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets -- 5.1.2.3. The National Strategy to Secure Cyberspace -- 5.1.3. Homeland Security Presidential Directives and National Initiatives -- 5.1.3.1. HSPD-3, Homeland Security Advisory System -- 5.1.3.2. HSPD-5, Management of Domestic Incidents -- 5.1.3.3. HSPD-7, Critical Infrastructure Identification, Prioritization, and Protection -- 5.1.3.4. HSPD-8, National Preparedness -- 5.2. THE CI/KR PROTECTION COMPONENTOF THE HOMELAND SECURITY MISSION -- 5.3. RELATIONSHIP OF THE NIPP AND SSPS TO OTHER CI/KRPLANS AND PROGRAMS -- 5.3.1. Sector-Specific Plans -- 5.3.2. State, Regional, Local, and Tribal CI/KR Protection Programs -- 5.3.3. Other Security Partner Plans or Programs Related to CI/KRProtection -- 5.4. CI/KR PROTECTION AND INCIDENT MANAGEMENT -- 5.4.1. The National Response Plan -- 5.4.2. Transitioning From NIPP Steady-State to Incident Management. Chapter 66. ENSURING AN EFFECTIVE,EFFICIENT PROGRAM OVER THE LONG TERM -- 6.1. BUILDING NATIONAL AWARENESS -- 6.2. ENABLING EDUCATION, TRAINING,AND EXERCISE PROGRAMS -- 6.2.1. Types of Expertise for CI/KR Protection -- 6.2.2. Individual Education and Training -- 6.2.2.1. Technical CI/KR Protection Training -- 6.2.2.2. Academic and Research Programs -- 6.2.2.3. Continuing Education and Professional Competency -- 6.2.3. Organizational Training and Exercises -- 6.2.4. Security Partner Role and Approach -- 6.3. Conducting Research and Development and Using Technology -- 6.3.1. R& -- D Programs -- 6.3.2. The SAFETY Act -- 6.3.3. National Critical Infrastructure Protection R& -- D Plan -- 6.3.3.1 CI/KR Protection R& -- D Strategic Goals -- 6.3.3.2. CI/KR Protection R& -- D Areas -- 6.3.3.3. CI/KR Protection R& -- D Roadmap -- 6.3.3.4. Coordination of NCIP R& -- D Plan With SSP R& -- D Planning -- 6.3.4. Cyber Security R& -- D Planning -- 6.3.5. Other R& -- D That Supports CI/KR Protection -- 6.3.6. Technology Pilot Programs -- 6.4. BUILDING, PROTECTING, AND MAINTAINING DATABASES,SIMULATIONS, AND OTHER TOOLS -- 6.4.1. National CI/KR Protection Data Systems -- 6.4.2. Simulation and Modeling -- 6.4.3. Coordination with Security Partners on Databases and Modeling -- 6.5. CONTINUOUSLY IMPROVING THE NIPP AND THE SSPS -- 6.5.1. Management and Coordination -- 6.5.2. Maintenance and Updating -- Chapter 77. PROVIDING RESOURCES FOR THE CI/KRPROTECTION PROGRAM -- 7.1. THE RISK-BASED RESOURCE ALLOCATION PROCESS -- 7.1.1. Sector-Specific Agency Reporting to DHS -- 7.1.2. State Government Reporting to DHS -- 7.1.3. Aggregating Submissions to DHS -- 7.2. FEDERAL RESOURCE ALLOCATION PROCESS FOR DHS, THESSAS, AND OTHER FEDERAL AGENCIES -- 7.2.1. Department of Homeland Security -- 7.2.2. Sector-Specific Agencies. 7.2.3. Summary of Roles and Responsibilities. |
Record Nr. | UNINA-9910820790203321 |
New York, : Nova Science Publishers, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|