Vai al contenuto principale della pagina
| Autore: |
Gordon Gary A
|
| Titolo: |
Securing integrated transportation networks
|
| Pubblicazione: | San Diego : , : Elsevier, , 2024 |
| ©2024 | |
| Edizione: | 1st ed. |
| Descrizione fisica: | 1 online resource (436 pages) |
| Soggetto topico: | Transportation |
| Computer security | |
| Altri autori: |
YoungRichard R. <1946->
|
| Nota di contenuto: | Front Cover -- SECURING INTEGRATED TRANSPORTATION NETWORKS -- SECURING INTEGRATED TRANSPORTATION NETWORKS -- Copyright -- Contents -- Foreword -- Acknowledgments -- I - The evolution of transportation security -- 1 - Overview of transportation and why we want to secure it∗ -- Prologue -- 1.1 What is transportation? -- 1.2 Freight transportation -- 1.2.1 International transportation -- 1.3 Moving people -- 1.4 Components of transportation -- 1.4.1 Rights of way -- 1.4.2 Vehicles -- 1.5 What is transportation infrastructure? -- 1.5.1 Infrastructure and operations -- 1.5.2 Scheduling: How it shapes operations -- 1.5.3 How operations shape it -- 1.5.4 Unique challenges of infrastructure -- 1.5.4.1 Useful life -- 1.5.4.2 Financial concerns -- 1.5.4.3 Safety and security -- 1.6 Evolution of transportation modes -- 1.7 Cybersystem dependence -- 1.8 Threats and vulnerabilities overview -- 1.8.1 Natural disasters -- 1.8.2 Manmade disasters -- 1.8.3 Combined threats -- 1.9 Securing transportation infrastructure and operations -- 1.9.1 Human impact (movement of people) -- 1.9.2 Economic impact (movement of goods) -- References -- 2 - Transportation security before and after 9/11 -- 2.1 Introduction -- 2.2 Transportation security: A little history -- 2.3 Protecting the railroads -- 2.3.1 Railroads in wartime -- 2.4 Shifts in modal preferences -- 2.5 Intermodalism -- 2.6 Protecting transportation infrastructure -- 2.6.1 Historical development -- 2.6.2 Terrorism and changing international trade forever -- 2.7 Enhancing initiatives with cross-sector alliances -- 2.7.1 Alliances, both public and private -- 2.7.2 Internationalization of trade alliances -- 2.7.3 Private-private alliances -- 2.8 Summary -- References -- 3 - Federal agencies-Regulation and the promotion of economic growth -- 3.1 Introduction -- 3.2 A complex evolution. |
| 3.3 Railroads: Where it all began -- 3.3.1 Economic regulation -- 3.3.2 Safety regulation -- 3.3.3 Security regulation -- 3.4 Motor carriers: Protecting a nascent industry -- 3.4.1 Promoting highways -- 3.4.2 Economic regulation -- 3.4.3 Safety regulation -- 3.4.4 Security regulation -- 3.5 Transit: A formerly embedded activity -- 3.5.1 Deemphasizing the automobile -- 3.5.2 Safety regulation -- 3.5.3 Security regulation -- 3.6 Aviation: Bifurcation of economic and safety regulations -- 3.6.1 Economic regulation -- 3.6.2 Safety regulation -- 3.6.3 Security regulation -- 3.7 Ocean maritime shipping -- 3.7.1 Promotion of seaborne commerce -- 3.7.2 Economic regulation -- 3.7.3 Safety regulation -- 3.7.4 Security regulation -- 3.8 Inland maritime shipping -- 3.8.1 Economic regulation -- 3.8.2 Safety regulation -- 3.8.3 Security regulation -- 3.9 Pipelines -- 3.9.1 Economic regulation -- 3.9.2 Safety regulation -- 3.9.3 Security regulation -- 3.10 Let's not forget intermodal -- 3.11 Sorting out the federal agencies -- 3.12 Summary -- Appendix A: Compendium of federal transportation-related legislation-1800s -- Appendix B: Compendium of federal transportation-related legislation-1900-1950 -- Appendix C: Compendium of federal transportation-related legislation-1951-2000 -- Appendix D: Compendium of federal transportation-related legislation-2000+ -- References -- 4 - Who are the parties involved and what are their relationships?∗ -- 4.1 Introduction -- 4.1.1 Case scenario -- 4.2 Modal partners -- 4.2.1 Aviation -- 4.2.2 Bus and rail transit -- 4.2.3 Freight and passenger rail -- 4.2.4 Highway and motor carriers -- 4.2.4.1 Infrastructure ownership -- 4.2.5 Intermodal -- 4.2.6 Maritime -- 4.2.7 Pipelines -- 4.3 Cooperative and partnered security programs and initiatives -- 4.3.1 Cross-sector dependencies -- 4.3.2 Chemical sector. | |
| 4.3.3 Transportation dependencies -- 4.3.4 Visible Intermodal Prevention and Response -- 4.3.5 Container Security Initiative -- 4.3.6 Certified Cargo Screening Program -- 4.3.7 Customs Trade Partnership Against Terrorism -- 4.3.8 Private and public sector cooperation -- 4.4 Summary -- References -- 5 - Components and economics of transportation security -- 5.1 Introduction -- 5.1.1 Derived demand -- 5.1.2 Dual production -- 5.1.3 Spatial and temporal utility -- 5.1.4 Transit time -- 5.1.5 Complexity -- 5.1.6 A primer on protection -- 5.2 The nature of transportation infrastructure -- 5.2.1 Infrastructure specifics -- 5.3 Analysis of benefits -- 5.4 Dictated infrastructure -- 5.5 Safety and security -- 5.6 Transit time -- 5.7 Economic effects and goods -- 5.8 Total cost of ownership: Initial costs and ongoing maintenance expenses -- 5.9 Asset utilization -- 5.10 Mutual aid -- 5.11 Intermodal operations -- 5.12 Adding protective assets -- 5.13 The problem of scale -- 5.14 Determining probability -- 5.15 Summary -- References -- Suggested additional reference materials -- II - Exposure -- 6 - Nature of transported people and goods -- 6.1 Introduction -- 6.2 Transporting people -- 6.2.1 Transporting for employment -- 6.2.2 Transporting for nonvocational commercial activity -- 6.2.3 Transporting for social purposes -- 6.2.4 Transporting for and as entertainment -- 6.2.5 Secondary incidental purposes -- 6.3 Freight -- 6.3.1 Finished products -- 6.3.2 Semifinished products -- 6.3.3 Refined materials -- 6.3.4 Basic materials -- 6.4 Modal attributes -- 6.4.1 Accessibility -- 6.4.2 Capability -- 6.4.3 Ease of arrangement -- 6.4.4 Transit time -- 6.4.5 Reliability -- 6.4.6 Price and cost -- 6.4.7 Security -- 6.5 Security concerns according to supply chain tier -- 6.6 Summary -- References -- 7 - Threats, vulnerabilities, consequences, and risks. | |
| 7.1 Introduction -- 7.2 Definitions -- 7.2.1 Threats -- 7.2.1.1 Multiple threats -- 7.2.1.2 Scope -- 7.2.2 Vulnerabilities -- 7.2.3 Consequences -- 7.2.4 Risk -- 7.3 Transportation infrastructure -- 7.3.1 Railroads -- 7.3.1.1 Rights-of-way -- 7.3.1.2 Train robbery -- 7.3.1.3 Stations and terminals -- 7.3.1.4 Hazmat-loaded railcars -- 7.3.1.5 Explosive devices -- 7.3.1.6 Maintenance facilities -- 7.3.1.7 Cyberattacks -- 7.3.2 Motor carriers -- 7.3.2.1 Hijacking and cargo theft -- 7.3.2.2 Transporting illegal cargo -- 7.3.2.3 Destruction of vehicles -- 7.3.3 Ocean maritime -- 7.3.3.1 Cyberthreats -- 7.3.3.2 Hijacking and piracy (risks at sea) -- 7.3.3.3 Compromised cargo -- 7.3.3.4 Malfunctioning navigational systems -- 7.3.3.5 Risks in port -- 7.3.4 Inland maritime -- 7.3.5 Aviation -- 7.3.5.1 Passenger terminals -- 7.3.5.2 Airfreight -- 7.3.5.3 Aircraft -- 7.3.5.4 Cyberattacks -- 7.3.6 Pipelines -- 7.3.6.1 Rights-of-way -- 7.3.6.2 Storage facilities -- 7.3.6.3 Cyberattacks -- 7.3.7 Transit -- 7.3.7.1 Passengers -- 7.3.7.2 Vehicles -- 7.3.7.3 Transit personnel -- 7.3.7.4 Cyberattacks -- 7.3.8 Let's not forget intermodal -- 7.4 Summary -- References -- 8 - Natural versus manmade disasters -- 8.1 Introduction -- 8.2 All-hazards Approach -- 8.3 Developing a common lexicon -- 8.4 Phases of emergencies or incidents1 -- 8.4.1 Planning -- 8.4.2 Preparedness -- 8.4.3 Transition from preparedness to response -- 8.4.4 Response -- 8.4.5 Recovery -- 8.4.6 Mitigation -- 8.5 Agencies -- 8.5.1 Federal government agencies -- 8.5.2 State, territorial, and local government agencies -- 8.6 Stakeholders -- 8.7 What should transportation organizations and stakeholders do? -- 8.7.1 Planning -- 8.7.2 Preparedness -- 8.7.3 Response -- 8.7.4 Recovery -- 8.7.5 Mitigation -- 8.8 Continuous preparedness -- 8.9 Summary -- Appendix A: Short glossary of emergency management terms. | |
| References -- 9 - Assessing risk -- 9.1 Introduction -- 9.2 What are the risks to transportation systems? -- 9.2.1 Railroads -- 9.2.2 Transit -- 9.2.3 Highway/motor carriers -- 9.2.4 Pipelines -- 9.2.5 Aviation -- 9.2.6 Maritime operations -- 9.3 Assessing risk -- 9.3.1 Qualitatively assessing risk -- 9.3.1.1 Modified CARVER model -- 9.3.2 Quantitatively assessing risk -- 9.3.2.1 Blue Ribbon panel method -- 9.3.2.2 TSA risk management analysis tool -- 9.3.2.3 Rail corridor risk assessment system -- 9.3.2.4 Maritime security risk assessment method -- 9.3.2.5 Pipeline risk assessment models -- 9.3.2.6 Transit risk assessments -- 9.3.2.7 Risk assessment similarities and differences -- 9.4 Future assessment needs -- References -- 10 - Cyber threats and risks -- 10.1 Introduction to cybersecurity threats and transportation -- 10.1.1 Overview -- 10.1.2 Outsider versus insider threats -- 10.1.3 What are the objectives? -- 10.2 How we got to where we are -- 10.2.1 Some working definitions -- 10.2.2 IT and OT convergence -- 10.3 Modal-specific IT and OT systems -- 10.3.1 Aviation -- 10.3.1.1 Segment overview -- 10.3.1.2 Some key risks and vulnerabilities -- 10.3.2 Maritime transportation -- 10.3.2.1 Seagoing maritime transportation -- 10.3.2.2 Cyber risk for seagoing maritime transportation -- 10.3.2.3 Inland maritime transportation -- 10.3.2.4 Cyber risk for inland maritime transportation -- 10.3.3 Railroad transportation -- 10.3.3.1 Cyber risk for railroad transportation -- 10.3.4 Highway transportation -- 10.3.4.1 Cyber risk for highway transportation -- 10.3.5 Rail and bus transit -- 10.3.6 Pipeline transportation -- 10.3.6.1 Cyber risk for pipeline transportation -- 10.4 Common threads means common threats -- 10.5 Generic means of protecting from cyberattacks -- 10.5.1 Cybersecurity policies -- 10.5.2 Early detection processes. | |
| 10.5.3 Responses to cyberattack. | |
| Sommario/riassunto: | This book, 'Securing Integrated Networks,' delves into the complexities of ensuring security across various transportation networks, including freight, passenger, and intermodal systems. Authored by experts in civil and environmental engineering and business, it examines the evolution of security practices, particularly post-9/11, highlighting the interconnectedness of cybersystems and physical security measures. The text covers a wide array of topics such as federal regulations, the role of different transportation modes, and the threats they face. It emphasizes the importance of collaboration between public and private sectors and the need for continuous preparedness against both natural and manmade disasters. The book is intended for professionals and researchers in transportation security, providing insights into best practices and emerging challenges in the field. |
| Titolo autorizzato: | Securing integrated transportation networks ![]() |
| ISBN: | 9780323954082 |
| 9780323954099 | |
| Formato: | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione: | Inglese |
| Record Nr.: | 9911006655603321 |
| Lo trovi qui: | Univ. Federico II |
| Opac: | Controlla la disponibilità qui |