Critical Infrastructure System Security and Resiliency:
Security protections for critical infrastructure nodes are intended to minimize the risks resulting from an initiating event, whether it is an intentional malevolent act or a natural hazard. With an emphasis on protecting an infrastructure's ability to perform its mission or function, Critical...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton [u.a.]
CRC Press
2013
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | Security protections for critical infrastructure nodes are intended to minimize the risks resulting from an initiating event, whether it is an intentional malevolent act or a natural hazard. With an emphasis on protecting an infrastructure's ability to perform its mission or function, Critical Infrastructure System Security and Resiliency presents a practical methodology for developing an effective protection system that can either prevent undesired events or mitigate the consequences of such events. Developed at Sandia National Labs, the authors' analytical approach and methodology enables de |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XXVI, 203 S. graf. Darst. |
ISBN: | 9781466557505 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV040994617 | ||
003 | DE-604 | ||
005 | 20130611 | ||
007 | t | ||
008 | 130514s2013 |||| |||| 00||| eng d | ||
020 | |a 9781466557505 |c hbk |9 978-1-4665-5750-5 | ||
035 | |a (OCoLC)854709472 | ||
035 | |a (DE-599)BVBBV040994617 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-473 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Biringer, Betty E. |d 1952- |e Verfasser |0 (DE-588)173914020 |4 aut | |
245 | 1 | 0 | |a Critical Infrastructure System Security and Resiliency |c Betty E. Biringer , Eric D. Vugrin ; Drake E. Warren |
264 | 1 | |a Boca Raton [u.a.] |b CRC Press |c 2013 | |
300 | |a XXVI, 203 S. |b graf. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | 1 | |a Security protections for critical infrastructure nodes are intended to minimize the risks resulting from an initiating event, whether it is an intentional malevolent act or a natural hazard. With an emphasis on protecting an infrastructure's ability to perform its mission or function, Critical Infrastructure System Security and Resiliency presents a practical methodology for developing an effective protection system that can either prevent undesired events or mitigate the consequences of such events. Developed at Sandia National Labs, the authors' analytical approach and methodology enables de | |
650 | 0 | 7 | |a Elastizität |0 (DE-588)4014159-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenverarbeitung |0 (DE-588)4011152-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Infrastruktur |0 (DE-588)4026944-9 |2 gnd |9 rswk-swf |
651 | 7 | |a USA |0 (DE-588)4078704-7 |2 gnd |9 rswk-swf | |
689 | 0 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 0 | 1 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |D s |
689 | 0 | 2 | |a Infrastruktur |0 (DE-588)4026944-9 |D s |
689 | 0 | 3 | |a Datenverarbeitung |0 (DE-588)4011152-0 |D s |
689 | 0 | 4 | |a Elastizität |0 (DE-588)4014159-7 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Vugrin, Eric D. |e Verfasser |4 aut | |
700 | 1 | |a Warren, Drake E. |e Verfasser |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025972345&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-025972345 |
Datensatz im Suchindex
_version_ | 1804150318848540672 |
---|---|
adam_text | Contents
List of Figures
xiii
List of Tables
xv
Foreword
xvii
Acknowledgments
xxi
About the Authors
xxiii
Acronyms and Abbreviations
xxv
Section I
SECURITY RISK ASSESSMENT
1
Introduction to Security Risk Assessment
3
Security Risk Assessment
5
Protection System Robustness
6
Security System Resiliency
6
System Approach for Security Risk Assessment
7
Determine Undesired Events, Associated Critical Assets,
and Available Resources
8
Threat Analysis
8
Assess Likelihood of Initiating Event
8
Estimate Protection System Effectiveness
9
Assess Consequences for Undesired Event
9
Estimate Security Risk
9
Upgrade the Protection System to Be Robust against
Undesired Event
10
Upgrade Security System to Be Resilient for Undesired Event
10
Summary
10
Reference
10
2
Undesired Events, Associated Critical Assets, and
Available Resources
11
Critical Assets H
Logic Model
12
Logic Gates
12
vii
viii Contents
Transfer
Operations
13
Primary Events
13
Resources
16
Summary
16
References
17
3
Threat Analysis
19
Malevolent Threats
19
Type of Adversary
23
Adversary Capability
24
Design Basis Threat
25
Natural Hazards
26
Hurricane
27
Earthquake
27
Tornado
27
Flood
27
Accidents
28
Summary
29
References
29
4
Likelihood of Initiating Events
31
Malevolent Threat
31
Outsider Threat
32
Insider Threat
34
Natural Hazard Threat
36
Accident Threat
36
Summary
38
References
38
5
Assess Consequences and Responses for
Undesired Event
39
Reference Table for Consequences
39
Estimating Consequence Level for Undesired Events
41
Summary
42
Reference
42
6
Assessment of Protection System Effectiveness
43
Assessment of Protection System Effectiveness for Malevolent
Threat
43
Adversary Scenarios
44
Effective Physical Protection System for the Malevolent
Threat
46
Contents ix
Physical Protection System Effectiveness Assessment
48
Assessment Example
49
Protection System Effectiveness against Blast Attacks
52
Assessment Example
52
Mitigation of the Insider Threat
53
Cyber Protection System Effectiveness
55
Cyber Functions
56
Assessment Example
57
Effectiveness for Natural Hazards
58
Protection System Effectiveness Assessment Example
59
Protection System Effectiveness for Accidents
60
Assessment Example
60
Summary
62
References
62
7
Estimate Security Risk
63
System Approach for Security Risk Assessment
63
Determine Undesired Events, Associated Critical Assets,
and Available Resources
64
Threat Analysis
65
Assess Likelihood of Initiating Event
65
Estimate Protection System Effectiveness
65
Assess Consequences for Undesired Event
67
Estimate Security Risk
68
Upgrade Protection System to Be Robust against Undesired
Event
70
Upgrade Security System to Be Resilient for Undesired Event
72
Summary
72
Section II
EVALUATION AND DESIGN OF RESILIENT
SYSTEMS
8
Motivating Infrastructure Resilience Analysis
75
References
78
9
Current State of Resilience Assessment
79
Definitions of Resilience
80
Domains
84
x
Contents
Assessment Processes
85
Structural Resilience Assessment Methodologies
86
Qualitative Assessments
86
Quantitative and
Semiquantitative
Indexes
87
Performance-Based Measurement
89
Seismic Resilience
90
Probabilistic Assessment
91
Economic Resilience
93
Hybrid Approaches
96
Gaps and Limitations
99
Endnotes 102
References
102
10
Infrastructure Resilience Analysis Methodology
105
Definition of Resilience
107
Measurement of Resilience Costs
108
Systemic Impact
109
Total Recovery Effort
111
Resilience Cost Calculation
112
Use and Interpretation of Recovery-Dependent Resilience
Costs and Optimal Resilience Costs Quantities
114
Additional Notes on Calculation of Resilience Costs
115
Qualitative Structural Analysis
116
Absorptive Capacity
117
Adaptive Capacity
119
Restorative Capacity
121
Additional Notes on Resilience Capacities
123
Applying the Infrastructure Resilience Analysis Methodology
124
Summary
128
Endnote 129
References
129
11
Case Studies Using the Infrastructure Resilience
Analysis Framework
131
Qualitative Resilience Analysis Case Study
132
Define Systems
132
Define Scenario
133
Perform Structural Analysis
134
Analysis Conclusions
138
Quantitative Resilience Analysis Case Study
138
Define Systems
139
Define Scenario
139
Contents xi
Define
Metrics and Obtain Data
140
System Performance
140
Total Recovery Effort
142
Calculate Resilience Costs
143
Perform Structural Analysis
146
Absorptive Capacity
146
Adaptive Capacity
148
Restorative Capacity
150
Conclusions
151
Case Study on Optimizing Resilient Recovery Strategies
152
Define Systems
152
Define Scenario
153
Define Metrics
155
Obtain Data and Calculate Resilience Costs
157
The Rail Network Analysis System
158
Optimization
160
Simulation Results
161
Conclusions
165
Summary
166
Endnotes
167
References
168
Future Directions
171
References.
173
12
Appendix A: Example Use of Fault Trees to Identify
Critical Assets
175
Appendix B: Physical Protection Features Performance
Data
179
Index
193
|
any_adam_object | 1 |
author | Biringer, Betty E. 1952- Vugrin, Eric D. Warren, Drake E. |
author_GND | (DE-588)173914020 |
author_facet | Biringer, Betty E. 1952- Vugrin, Eric D. Warren, Drake E. |
author_role | aut aut aut |
author_sort | Biringer, Betty E. 1952- |
author_variant | b e b be beb e d v ed edv d e w de dew |
building | Verbundindex |
bvnumber | BV040994617 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)854709472 (DE-599)BVBBV040994617 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02481nam a2200457 c 4500</leader><controlfield tag="001">BV040994617</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20130611 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">130514s2013 |||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466557505</subfield><subfield code="c">hbk</subfield><subfield code="9">978-1-4665-5750-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)854709472</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV040994617</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Biringer, Betty E.</subfield><subfield code="d">1952-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)173914020</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Critical Infrastructure System Security and Resiliency</subfield><subfield code="c">Betty E. Biringer , Eric D. Vugrin ; Drake E. Warren</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton [u.a.]</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXVI, 203 S.</subfield><subfield code="b">graf. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1="1" ind2=" "><subfield code="a">Security protections for critical infrastructure nodes are intended to minimize the risks resulting from an initiating event, whether it is an intentional malevolent act or a natural hazard. With an emphasis on protecting an infrastructure's ability to perform its mission or function, Critical Infrastructure System Security and Resiliency presents a practical methodology for developing an effective protection system that can either prevent undesired events or mitigate the consequences of such events. Developed at Sandia National Labs, the authors' analytical approach and methodology enables de</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Elastizität</subfield><subfield code="0">(DE-588)4014159-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Infrastruktur</subfield><subfield code="0">(DE-588)4026944-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Infrastruktur</subfield><subfield code="0">(DE-588)4026944-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Elastizität</subfield><subfield code="0">(DE-588)4014159-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vugrin, Eric D.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Warren, Drake E.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025972345&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025972345</subfield></datafield></record></collection> |
geographic | USA (DE-588)4078704-7 gnd |
geographic_facet | USA |
id | DE-604.BV040994617 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T00:37:01Z |
institution | BVB |
isbn | 9781466557505 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025972345 |
oclc_num | 854709472 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG |
owner_facet | DE-473 DE-BY-UBG |
physical | XXVI, 203 S. graf. Darst. |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | CRC Press |
record_format | marc |
spelling | Biringer, Betty E. 1952- Verfasser (DE-588)173914020 aut Critical Infrastructure System Security and Resiliency Betty E. Biringer , Eric D. Vugrin ; Drake E. Warren Boca Raton [u.a.] CRC Press 2013 XXVI, 203 S. graf. Darst. txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index Security protections for critical infrastructure nodes are intended to minimize the risks resulting from an initiating event, whether it is an intentional malevolent act or a natural hazard. With an emphasis on protecting an infrastructure's ability to perform its mission or function, Critical Infrastructure System Security and Resiliency presents a practical methodology for developing an effective protection system that can either prevent undesired events or mitigate the consequences of such events. Developed at Sandia National Labs, the authors' analytical approach and methodology enables de Elastizität (DE-588)4014159-7 gnd rswk-swf Datenverarbeitung (DE-588)4011152-0 gnd rswk-swf Sicherheitspolitik (DE-588)4116489-1 gnd rswk-swf Infrastruktur (DE-588)4026944-9 gnd rswk-swf USA (DE-588)4078704-7 gnd rswk-swf USA (DE-588)4078704-7 g Sicherheitspolitik (DE-588)4116489-1 s Infrastruktur (DE-588)4026944-9 s Datenverarbeitung (DE-588)4011152-0 s Elastizität (DE-588)4014159-7 s DE-604 Vugrin, Eric D. Verfasser aut Warren, Drake E. Verfasser aut Digitalisierung UB Bamberg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025972345&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Biringer, Betty E. 1952- Vugrin, Eric D. Warren, Drake E. Critical Infrastructure System Security and Resiliency Elastizität (DE-588)4014159-7 gnd Datenverarbeitung (DE-588)4011152-0 gnd Sicherheitspolitik (DE-588)4116489-1 gnd Infrastruktur (DE-588)4026944-9 gnd |
subject_GND | (DE-588)4014159-7 (DE-588)4011152-0 (DE-588)4116489-1 (DE-588)4026944-9 (DE-588)4078704-7 |
title | Critical Infrastructure System Security and Resiliency |
title_auth | Critical Infrastructure System Security and Resiliency |
title_exact_search | Critical Infrastructure System Security and Resiliency |
title_full | Critical Infrastructure System Security and Resiliency Betty E. Biringer , Eric D. Vugrin ; Drake E. Warren |
title_fullStr | Critical Infrastructure System Security and Resiliency Betty E. Biringer , Eric D. Vugrin ; Drake E. Warren |
title_full_unstemmed | Critical Infrastructure System Security and Resiliency Betty E. Biringer , Eric D. Vugrin ; Drake E. Warren |
title_short | Critical Infrastructure System Security and Resiliency |
title_sort | critical infrastructure system security and resiliency |
topic | Elastizität (DE-588)4014159-7 gnd Datenverarbeitung (DE-588)4011152-0 gnd Sicherheitspolitik (DE-588)4116489-1 gnd Infrastruktur (DE-588)4026944-9 gnd |
topic_facet | Elastizität Datenverarbeitung Sicherheitspolitik Infrastruktur USA |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025972345&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT biringerbettye criticalinfrastructuresystemsecurityandresiliency AT vugrinericd criticalinfrastructuresystemsecurityandresiliency AT warrendrakee criticalinfrastructuresystemsecurityandresiliency |