Securing Integrated Transportation Networks:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Chantilly
Elsevier
2024
|
Ausgabe: | 1st ed |
Online-Zugang: | DE-2070s |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 Online-Ressource (436 Seiten) |
ISBN: | 9780323954082 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV050102323 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 241218s2024 xx o|||| 00||| eng d | ||
020 | |a 9780323954082 |9 978-0-323-95408-2 | ||
035 | |a (ZDB-30-PQE)EBC31354283 | ||
035 | |a (ZDB-30-PAD)EBC31354283 | ||
035 | |a (ZDB-89-EBL)EBL31354283 | ||
035 | |a (OCoLC)1435926105 | ||
035 | |a (DE-599)BVBBV050102323 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-2070s | ||
082 | 0 | |a 363.287 | |
100 | 1 | |a Gordon, Gary A. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Securing Integrated Transportation Networks |
250 | |a 1st ed | ||
264 | 1 | |a Chantilly |b Elsevier |c 2024 | |
264 | 4 | |c ©2024 | |
300 | |a 1 Online-Ressource (436 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
505 | 8 | |a Front Cover -- SECURING INTEGRATED TRANSPORTATION NETWORKS -- SECURING INTEGRATED TRANSPORTATION NETWORKS -- Copyright -- Contents -- Foreword -- Acknowledgments -- I - The evolution of transportation security -- 1 - Overview of transportation and why we want to secure it∗ -- Prologue -- 1.1 What is transportation? -- 1.2 Freight transportation -- 1.2.1 International transportation -- 1.3 Moving people -- 1.4 Components of transportation -- 1.4.1 Rights of way -- 1.4.2 Vehicles -- 1.5 What is transportation infrastructure? -- 1.5.1 Infrastructure and operations -- 1.5.2 Scheduling: How it shapes operations -- 1.5.3 How operations shape it -- 1.5.4 Unique challenges of infrastructure -- 1.5.4.1 Useful life -- 1.5.4.2 Financial concerns -- 1.5.4.3 Safety and security -- 1.6 Evolution of transportation modes -- 1.7 Cybersystem dependence -- 1.8 Threats and vulnerabilities overview -- 1.8.1 Natural disasters -- 1.8.2 Manmade disasters -- 1.8.3 Combined threats -- 1.9 Securing transportation infrastructure and operations -- 1.9.1 Human impact (movement of people) -- 1.9.2 Economic impact (movement of goods) -- References -- 2 - Transportation security before and after 9/11 -- 2.1 Introduction -- 2.2 Transportation security: A little history -- 2.3 Protecting the railroads -- 2.3.1 Railroads in wartime -- 2.4 Shifts in modal preferences -- 2.5 Intermodalism -- 2.6 Protecting transportation infrastructure -- 2.6.1 Historical development -- 2.6.2 Terrorism and changing international trade forever -- 2.7 Enhancing initiatives with cross-sector alliances -- 2.7.1 Alliances, both public and private -- 2.7.2 Internationalization of trade alliances -- 2.7.3 Private-private alliances -- 2.8 Summary -- References -- 3 - Federal agencies-Regulation and the promotion of economic growth -- 3.1 Introduction -- 3.2 A complex evolution | |
505 | 8 | |a 3.3 Railroads: Where it all began -- 3.3.1 Economic regulation -- 3.3.2 Safety regulation -- 3.3.3 Security regulation -- 3.4 Motor carriers: Protecting a nascent industry -- 3.4.1 Promoting highways -- 3.4.2 Economic regulation -- 3.4.3 Safety regulation -- 3.4.4 Security regulation -- 3.5 Transit: A formerly embedded activity -- 3.5.1 Deemphasizing the automobile -- 3.5.2 Safety regulation -- 3.5.3 Security regulation -- 3.6 Aviation: Bifurcation of economic and safety regulations -- 3.6.1 Economic regulation -- 3.6.2 Safety regulation -- 3.6.3 Security regulation -- 3.7 Ocean maritime shipping -- 3.7.1 Promotion of seaborne commerce -- 3.7.2 Economic regulation -- 3.7.3 Safety regulation -- 3.7.4 Security regulation -- 3.8 Inland maritime shipping -- 3.8.1 Economic regulation -- 3.8.2 Safety regulation -- 3.8.3 Security regulation -- 3.9 Pipelines -- 3.9.1 Economic regulation -- 3.9.2 Safety regulation -- 3.9.3 Security regulation -- 3.10 Let's not forget intermodal -- 3.11 Sorting out the federal agencies -- 3.12 Summary -- Appendix A: Compendium of federal transportation-related legislation-1800s -- Appendix B: Compendium of federal transportation-related legislation-1900-1950 -- Appendix C: Compendium of federal transportation-related legislation-1951-2000 -- Appendix D: Compendium of federal transportation-related legislation-2000+ -- References -- 4 - Who are the parties involved and what are their relationships?∗ -- 4.1 Introduction -- 4.1.1 Case scenario -- 4.2 Modal partners -- 4.2.1 Aviation -- 4.2.2 Bus and rail transit -- 4.2.3 Freight and passenger rail -- 4.2.4 Highway and motor carriers -- 4.2.4.1 Infrastructure ownership -- 4.2.5 Intermodal -- 4.2.6 Maritime -- 4.2.7 Pipelines -- 4.3 Cooperative and partnered security programs and initiatives -- 4.3.1 Cross-sector dependencies -- 4.3.2 Chemical sector | |
505 | 8 | |a 4.3.3 Transportation dependencies -- 4.3.4 Visible Intermodal Prevention and Response -- 4.3.5 Container Security Initiative -- 4.3.6 Certified Cargo Screening Program -- 4.3.7 Customs Trade Partnership Against Terrorism -- 4.3.8 Private and public sector cooperation -- 4.4 Summary -- References -- 5 - Components and economics of transportation security -- 5.1 Introduction -- 5.1.1 Derived demand -- 5.1.2 Dual production -- 5.1.3 Spatial and temporal utility -- 5.1.4 Transit time -- 5.1.5 Complexity -- 5.1.6 A primer on protection -- 5.2 The nature of transportation infrastructure -- 5.2.1 Infrastructure specifics -- 5.3 Analysis of benefits -- 5.4 Dictated infrastructure -- 5.5 Safety and security -- 5.6 Transit time -- 5.7 Economic effects and goods -- 5.8 Total cost of ownership: Initial costs and ongoing maintenance expenses -- 5.9 Asset utilization -- 5.10 Mutual aid -- 5.11 Intermodal operations -- 5.12 Adding protective assets -- 5.13 The problem of scale -- 5.14 Determining probability -- 5.15 Summary -- References -- Suggested additional reference materials -- II - Exposure -- 6 - Nature of transported people and goods -- 6.1 Introduction -- 6.2 Transporting people -- 6.2.1 Transporting for employment -- 6.2.2 Transporting for nonvocational commercial activity -- 6.2.3 Transporting for social purposes -- 6.2.4 Transporting for and as entertainment -- 6.2.5 Secondary incidental purposes -- 6.3 Freight -- 6.3.1 Finished products -- 6.3.2 Semifinished products -- 6.3.3 Refined materials -- 6.3.4 Basic materials -- 6.4 Modal attributes -- 6.4.1 Accessibility -- 6.4.2 Capability -- 6.4.3 Ease of arrangement -- 6.4.4 Transit time -- 6.4.5 Reliability -- 6.4.6 Price and cost -- 6.4.7 Security -- 6.5 Security concerns according to supply chain tier -- 6.6 Summary -- References -- 7 - Threats, vulnerabilities, consequences, and risks | |
505 | 8 | |a 7.1 Introduction -- 7.2 Definitions -- 7.2.1 Threats -- 7.2.1.1 Multiple threats -- 7.2.1.2 Scope -- 7.2.2 Vulnerabilities -- 7.2.3 Consequences -- 7.2.4 Risk -- 7.3 Transportation infrastructure -- 7.3.1 Railroads -- 7.3.1.1 Rights-of-way -- 7.3.1.2 Train robbery -- 7.3.1.3 Stations and terminals -- 7.3.1.4 Hazmat-loaded railcars -- 7.3.1.5 Explosive devices -- 7.3.1.6 Maintenance facilities -- 7.3.1.7 Cyberattacks -- 7.3.2 Motor carriers -- 7.3.2.1 Hijacking and cargo theft -- 7.3.2.2 Transporting illegal cargo -- 7.3.2.3 Destruction of vehicles -- 7.3.3 Ocean maritime -- 7.3.3.1 Cyberthreats -- 7.3.3.2 Hijacking and piracy (risks at sea) -- 7.3.3.3 Compromised cargo -- 7.3.3.4 Malfunctioning navigational systems -- 7.3.3.5 Risks in port -- 7.3.4 Inland maritime -- 7.3.5 Aviation -- 7.3.5.1 Passenger terminals -- 7.3.5.2 Airfreight -- 7.3.5.3 Aircraft -- 7.3.5.4 Cyberattacks -- 7.3.6 Pipelines -- 7.3.6.1 Rights-of-way -- 7.3.6.2 Storage facilities -- 7.3.6.3 Cyberattacks -- 7.3.7 Transit -- 7.3.7.1 Passengers -- 7.3.7.2 Vehicles -- 7.3.7.3 Transit personnel -- 7.3.7.4 Cyberattacks -- 7.3.8 Let's not forget intermodal -- 7.4 Summary -- References -- 8 - Natural versus manmade disasters -- 8.1 Introduction -- 8.2 All-hazards Approach -- 8.3 Developing a common lexicon -- 8.4 Phases of emergencies or incidents1 -- 8.4.1 Planning -- 8.4.2 Preparedness -- 8.4.3 Transition from preparedness to response -- 8.4.4 Response -- 8.4.5 Recovery -- 8.4.6 Mitigation -- 8.5 Agencies -- 8.5.1 Federal government agencies -- 8.5.2 State, territorial, and local government agencies -- 8.6 Stakeholders -- 8.7 What should transportation organizations and stakeholders do? -- 8.7.1 Planning -- 8.7.2 Preparedness -- 8.7.3 Response -- 8.7.4 Recovery -- 8.7.5 Mitigation -- 8.8 Continuous preparedness -- 8.9 Summary -- Appendix A: Short glossary of emergency management terms | |
505 | 8 | |a References -- 9 - Assessing risk -- 9.1 Introduction -- 9.2 What are the risks to transportation systems? -- 9.2.1 Railroads -- 9.2.2 Transit -- 9.2.3 Highway/motor carriers -- 9.2.4 Pipelines -- 9.2.5 Aviation -- 9.2.6 Maritime operations -- 9.3 Assessing risk -- 9.3.1 Qualitatively assessing risk -- 9.3.1.1 Modified CARVER model -- 9.3.2 Quantitatively assessing risk -- 9.3.2.1 Blue Ribbon panel method -- 9.3.2.2 TSA risk management analysis tool -- 9.3.2.3 Rail corridor risk assessment system -- 9.3.2.4 Maritime security risk assessment method -- 9.3.2.5 Pipeline risk assessment models -- 9.3.2.6 Transit risk assessments -- 9.3.2.7 Risk assessment similarities and differences -- 9.4 Future assessment needs -- References -- 10 - Cyber threats and risks -- 10.1 Introduction to cybersecurity threats and transportation -- 10.1.1 Overview -- 10.1.2 Outsider versus insider threats -- 10.1.3 What are the objectives? -- 10.2 How we got to where we are -- 10.2.1 Some working definitions -- 10.2.2 IT and OT convergence -- 10.3 Modal-specific IT and OT systems -- 10.3.1 Aviation -- 10.3.1.1 Segment overview -- 10.3.1.2 Some key risks and vulnerabilities -- 10.3.2 Maritime transportation -- 10.3.2.1 Seagoing maritime transportation -- 10.3.2.2 Cyber risk for seagoing maritime transportation -- 10.3.2.3 Inland maritime transportation -- 10.3.2.4 Cyber risk for inland maritime transportation -- 10.3.3 Railroad transportation -- 10.3.3.1 Cyber risk for railroad transportation -- 10.3.4 Highway transportation -- 10.3.4.1 Cyber risk for highway transportation -- 10.3.5 Rail and bus transit -- 10.3.6 Pipeline transportation -- 10.3.6.1 Cyber risk for pipeline transportation -- 10.4 Common threads means common threats -- 10.5 Generic means of protecting from cyberattacks -- 10.5.1 Cybersecurity policies -- 10.5.2 Early detection processes | |
505 | 8 | |a 10.5.3 Responses to cyberattack | |
700 | 1 | |a Young, Richard R. |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Gordon, Gary A. |t Securing Integrated Transportation Networks |d Chantilly : Elsevier,c2024 |z 9780323954099 |
912 | |a ZDB-30-PQE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035439485 | |
966 | e | |u https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=31354283 |l DE-2070s |p ZDB-30-PQE |q HWR_PDA_PQE |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1818806145112866816 |
---|---|
adam_text | |
any_adam_object | |
author | Gordon, Gary A. |
author_facet | Gordon, Gary A. |
author_role | aut |
author_sort | Gordon, Gary A. |
author_variant | g a g ga gag |
building | Verbundindex |
bvnumber | BV050102323 |
collection | ZDB-30-PQE |
contents | Front Cover -- SECURING INTEGRATED TRANSPORTATION NETWORKS -- SECURING INTEGRATED TRANSPORTATION NETWORKS -- Copyright -- Contents -- Foreword -- Acknowledgments -- I - The evolution of transportation security -- 1 - Overview of transportation and why we want to secure it∗ -- Prologue -- 1.1 What is transportation? -- 1.2 Freight transportation -- 1.2.1 International transportation -- 1.3 Moving people -- 1.4 Components of transportation -- 1.4.1 Rights of way -- 1.4.2 Vehicles -- 1.5 What is transportation infrastructure? -- 1.5.1 Infrastructure and operations -- 1.5.2 Scheduling: How it shapes operations -- 1.5.3 How operations shape it -- 1.5.4 Unique challenges of infrastructure -- 1.5.4.1 Useful life -- 1.5.4.2 Financial concerns -- 1.5.4.3 Safety and security -- 1.6 Evolution of transportation modes -- 1.7 Cybersystem dependence -- 1.8 Threats and vulnerabilities overview -- 1.8.1 Natural disasters -- 1.8.2 Manmade disasters -- 1.8.3 Combined threats -- 1.9 Securing transportation infrastructure and operations -- 1.9.1 Human impact (movement of people) -- 1.9.2 Economic impact (movement of goods) -- References -- 2 - Transportation security before and after 9/11 -- 2.1 Introduction -- 2.2 Transportation security: A little history -- 2.3 Protecting the railroads -- 2.3.1 Railroads in wartime -- 2.4 Shifts in modal preferences -- 2.5 Intermodalism -- 2.6 Protecting transportation infrastructure -- 2.6.1 Historical development -- 2.6.2 Terrorism and changing international trade forever -- 2.7 Enhancing initiatives with cross-sector alliances -- 2.7.1 Alliances, both public and private -- 2.7.2 Internationalization of trade alliances -- 2.7.3 Private-private alliances -- 2.8 Summary -- References -- 3 - Federal agencies-Regulation and the promotion of economic growth -- 3.1 Introduction -- 3.2 A complex evolution 3.3 Railroads: Where it all began -- 3.3.1 Economic regulation -- 3.3.2 Safety regulation -- 3.3.3 Security regulation -- 3.4 Motor carriers: Protecting a nascent industry -- 3.4.1 Promoting highways -- 3.4.2 Economic regulation -- 3.4.3 Safety regulation -- 3.4.4 Security regulation -- 3.5 Transit: A formerly embedded activity -- 3.5.1 Deemphasizing the automobile -- 3.5.2 Safety regulation -- 3.5.3 Security regulation -- 3.6 Aviation: Bifurcation of economic and safety regulations -- 3.6.1 Economic regulation -- 3.6.2 Safety regulation -- 3.6.3 Security regulation -- 3.7 Ocean maritime shipping -- 3.7.1 Promotion of seaborne commerce -- 3.7.2 Economic regulation -- 3.7.3 Safety regulation -- 3.7.4 Security regulation -- 3.8 Inland maritime shipping -- 3.8.1 Economic regulation -- 3.8.2 Safety regulation -- 3.8.3 Security regulation -- 3.9 Pipelines -- 3.9.1 Economic regulation -- 3.9.2 Safety regulation -- 3.9.3 Security regulation -- 3.10 Let's not forget intermodal -- 3.11 Sorting out the federal agencies -- 3.12 Summary -- Appendix A: Compendium of federal transportation-related legislation-1800s -- Appendix B: Compendium of federal transportation-related legislation-1900-1950 -- Appendix C: Compendium of federal transportation-related legislation-1951-2000 -- Appendix D: Compendium of federal transportation-related legislation-2000+ -- References -- 4 - Who are the parties involved and what are their relationships?∗ -- 4.1 Introduction -- 4.1.1 Case scenario -- 4.2 Modal partners -- 4.2.1 Aviation -- 4.2.2 Bus and rail transit -- 4.2.3 Freight and passenger rail -- 4.2.4 Highway and motor carriers -- 4.2.4.1 Infrastructure ownership -- 4.2.5 Intermodal -- 4.2.6 Maritime -- 4.2.7 Pipelines -- 4.3 Cooperative and partnered security programs and initiatives -- 4.3.1 Cross-sector dependencies -- 4.3.2 Chemical sector 4.3.3 Transportation dependencies -- 4.3.4 Visible Intermodal Prevention and Response -- 4.3.5 Container Security Initiative -- 4.3.6 Certified Cargo Screening Program -- 4.3.7 Customs Trade Partnership Against Terrorism -- 4.3.8 Private and public sector cooperation -- 4.4 Summary -- References -- 5 - Components and economics of transportation security -- 5.1 Introduction -- 5.1.1 Derived demand -- 5.1.2 Dual production -- 5.1.3 Spatial and temporal utility -- 5.1.4 Transit time -- 5.1.5 Complexity -- 5.1.6 A primer on protection -- 5.2 The nature of transportation infrastructure -- 5.2.1 Infrastructure specifics -- 5.3 Analysis of benefits -- 5.4 Dictated infrastructure -- 5.5 Safety and security -- 5.6 Transit time -- 5.7 Economic effects and goods -- 5.8 Total cost of ownership: Initial costs and ongoing maintenance expenses -- 5.9 Asset utilization -- 5.10 Mutual aid -- 5.11 Intermodal operations -- 5.12 Adding protective assets -- 5.13 The problem of scale -- 5.14 Determining probability -- 5.15 Summary -- References -- Suggested additional reference materials -- II - Exposure -- 6 - Nature of transported people and goods -- 6.1 Introduction -- 6.2 Transporting people -- 6.2.1 Transporting for employment -- 6.2.2 Transporting for nonvocational commercial activity -- 6.2.3 Transporting for social purposes -- 6.2.4 Transporting for and as entertainment -- 6.2.5 Secondary incidental purposes -- 6.3 Freight -- 6.3.1 Finished products -- 6.3.2 Semifinished products -- 6.3.3 Refined materials -- 6.3.4 Basic materials -- 6.4 Modal attributes -- 6.4.1 Accessibility -- 6.4.2 Capability -- 6.4.3 Ease of arrangement -- 6.4.4 Transit time -- 6.4.5 Reliability -- 6.4.6 Price and cost -- 6.4.7 Security -- 6.5 Security concerns according to supply chain tier -- 6.6 Summary -- References -- 7 - Threats, vulnerabilities, consequences, and risks 7.1 Introduction -- 7.2 Definitions -- 7.2.1 Threats -- 7.2.1.1 Multiple threats -- 7.2.1.2 Scope -- 7.2.2 Vulnerabilities -- 7.2.3 Consequences -- 7.2.4 Risk -- 7.3 Transportation infrastructure -- 7.3.1 Railroads -- 7.3.1.1 Rights-of-way -- 7.3.1.2 Train robbery -- 7.3.1.3 Stations and terminals -- 7.3.1.4 Hazmat-loaded railcars -- 7.3.1.5 Explosive devices -- 7.3.1.6 Maintenance facilities -- 7.3.1.7 Cyberattacks -- 7.3.2 Motor carriers -- 7.3.2.1 Hijacking and cargo theft -- 7.3.2.2 Transporting illegal cargo -- 7.3.2.3 Destruction of vehicles -- 7.3.3 Ocean maritime -- 7.3.3.1 Cyberthreats -- 7.3.3.2 Hijacking and piracy (risks at sea) -- 7.3.3.3 Compromised cargo -- 7.3.3.4 Malfunctioning navigational systems -- 7.3.3.5 Risks in port -- 7.3.4 Inland maritime -- 7.3.5 Aviation -- 7.3.5.1 Passenger terminals -- 7.3.5.2 Airfreight -- 7.3.5.3 Aircraft -- 7.3.5.4 Cyberattacks -- 7.3.6 Pipelines -- 7.3.6.1 Rights-of-way -- 7.3.6.2 Storage facilities -- 7.3.6.3 Cyberattacks -- 7.3.7 Transit -- 7.3.7.1 Passengers -- 7.3.7.2 Vehicles -- 7.3.7.3 Transit personnel -- 7.3.7.4 Cyberattacks -- 7.3.8 Let's not forget intermodal -- 7.4 Summary -- References -- 8 - Natural versus manmade disasters -- 8.1 Introduction -- 8.2 All-hazards Approach -- 8.3 Developing a common lexicon -- 8.4 Phases of emergencies or incidents1 -- 8.4.1 Planning -- 8.4.2 Preparedness -- 8.4.3 Transition from preparedness to response -- 8.4.4 Response -- 8.4.5 Recovery -- 8.4.6 Mitigation -- 8.5 Agencies -- 8.5.1 Federal government agencies -- 8.5.2 State, territorial, and local government agencies -- 8.6 Stakeholders -- 8.7 What should transportation organizations and stakeholders do? -- 8.7.1 Planning -- 8.7.2 Preparedness -- 8.7.3 Response -- 8.7.4 Recovery -- 8.7.5 Mitigation -- 8.8 Continuous preparedness -- 8.9 Summary -- Appendix A: Short glossary of emergency management terms References -- 9 - Assessing risk -- 9.1 Introduction -- 9.2 What are the risks to transportation systems? -- 9.2.1 Railroads -- 9.2.2 Transit -- 9.2.3 Highway/motor carriers -- 9.2.4 Pipelines -- 9.2.5 Aviation -- 9.2.6 Maritime operations -- 9.3 Assessing risk -- 9.3.1 Qualitatively assessing risk -- 9.3.1.1 Modified CARVER model -- 9.3.2 Quantitatively assessing risk -- 9.3.2.1 Blue Ribbon panel method -- 9.3.2.2 TSA risk management analysis tool -- 9.3.2.3 Rail corridor risk assessment system -- 9.3.2.4 Maritime security risk assessment method -- 9.3.2.5 Pipeline risk assessment models -- 9.3.2.6 Transit risk assessments -- 9.3.2.7 Risk assessment similarities and differences -- 9.4 Future assessment needs -- References -- 10 - Cyber threats and risks -- 10.1 Introduction to cybersecurity threats and transportation -- 10.1.1 Overview -- 10.1.2 Outsider versus insider threats -- 10.1.3 What are the objectives? -- 10.2 How we got to where we are -- 10.2.1 Some working definitions -- 10.2.2 IT and OT convergence -- 10.3 Modal-specific IT and OT systems -- 10.3.1 Aviation -- 10.3.1.1 Segment overview -- 10.3.1.2 Some key risks and vulnerabilities -- 10.3.2 Maritime transportation -- 10.3.2.1 Seagoing maritime transportation -- 10.3.2.2 Cyber risk for seagoing maritime transportation -- 10.3.2.3 Inland maritime transportation -- 10.3.2.4 Cyber risk for inland maritime transportation -- 10.3.3 Railroad transportation -- 10.3.3.1 Cyber risk for railroad transportation -- 10.3.4 Highway transportation -- 10.3.4.1 Cyber risk for highway transportation -- 10.3.5 Rail and bus transit -- 10.3.6 Pipeline transportation -- 10.3.6.1 Cyber risk for pipeline transportation -- 10.4 Common threads means common threats -- 10.5 Generic means of protecting from cyberattacks -- 10.5.1 Cybersecurity policies -- 10.5.2 Early detection processes 10.5.3 Responses to cyberattack |
ctrlnum | (ZDB-30-PQE)EBC31354283 (ZDB-30-PAD)EBC31354283 (ZDB-89-EBL)EBL31354283 (OCoLC)1435926105 (DE-599)BVBBV050102323 |
dewey-full | 363.287 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.287 |
dewey-search | 363.287 |
dewey-sort | 3363.287 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
edition | 1st ed |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000zc 4500</leader><controlfield tag="001">BV050102323</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">241218s2024 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780323954082</subfield><subfield code="9">978-0-323-95408-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC31354283</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PAD)EBC31354283</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL31354283</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1435926105</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV050102323</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-2070s</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">363.287</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gordon, Gary A.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing Integrated Transportation Networks</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Chantilly</subfield><subfield code="b">Elsevier</subfield><subfield code="c">2024</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (436 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Front Cover -- SECURING INTEGRATED TRANSPORTATION NETWORKS -- SECURING INTEGRATED TRANSPORTATION NETWORKS -- Copyright -- Contents -- Foreword -- Acknowledgments -- I - The evolution of transportation security -- 1 - Overview of transportation and why we want to secure it∗ -- Prologue -- 1.1 What is transportation? -- 1.2 Freight transportation -- 1.2.1 International transportation -- 1.3 Moving people -- 1.4 Components of transportation -- 1.4.1 Rights of way -- 1.4.2 Vehicles -- 1.5 What is transportation infrastructure? -- 1.5.1 Infrastructure and operations -- 1.5.2 Scheduling: How it shapes operations -- 1.5.3 How operations shape it -- 1.5.4 Unique challenges of infrastructure -- 1.5.4.1 Useful life -- 1.5.4.2 Financial concerns -- 1.5.4.3 Safety and security -- 1.6 Evolution of transportation modes -- 1.7 Cybersystem dependence -- 1.8 Threats and vulnerabilities overview -- 1.8.1 Natural disasters -- 1.8.2 Manmade disasters -- 1.8.3 Combined threats -- 1.9 Securing transportation infrastructure and operations -- 1.9.1 Human impact (movement of people) -- 1.9.2 Economic impact (movement of goods) -- References -- 2 - Transportation security before and after 9/11 -- 2.1 Introduction -- 2.2 Transportation security: A little history -- 2.3 Protecting the railroads -- 2.3.1 Railroads in wartime -- 2.4 Shifts in modal preferences -- 2.5 Intermodalism -- 2.6 Protecting transportation infrastructure -- 2.6.1 Historical development -- 2.6.2 Terrorism and changing international trade forever -- 2.7 Enhancing initiatives with cross-sector alliances -- 2.7.1 Alliances, both public and private -- 2.7.2 Internationalization of trade alliances -- 2.7.3 Private-private alliances -- 2.8 Summary -- References -- 3 - Federal agencies-Regulation and the promotion of economic growth -- 3.1 Introduction -- 3.2 A complex evolution</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">3.3 Railroads: Where it all began -- 3.3.1 Economic regulation -- 3.3.2 Safety regulation -- 3.3.3 Security regulation -- 3.4 Motor carriers: Protecting a nascent industry -- 3.4.1 Promoting highways -- 3.4.2 Economic regulation -- 3.4.3 Safety regulation -- 3.4.4 Security regulation -- 3.5 Transit: A formerly embedded activity -- 3.5.1 Deemphasizing the automobile -- 3.5.2 Safety regulation -- 3.5.3 Security regulation -- 3.6 Aviation: Bifurcation of economic and safety regulations -- 3.6.1 Economic regulation -- 3.6.2 Safety regulation -- 3.6.3 Security regulation -- 3.7 Ocean maritime shipping -- 3.7.1 Promotion of seaborne commerce -- 3.7.2 Economic regulation -- 3.7.3 Safety regulation -- 3.7.4 Security regulation -- 3.8 Inland maritime shipping -- 3.8.1 Economic regulation -- 3.8.2 Safety regulation -- 3.8.3 Security regulation -- 3.9 Pipelines -- 3.9.1 Economic regulation -- 3.9.2 Safety regulation -- 3.9.3 Security regulation -- 3.10 Let's not forget intermodal -- 3.11 Sorting out the federal agencies -- 3.12 Summary -- Appendix A: Compendium of federal transportation-related legislation-1800s -- Appendix B: Compendium of federal transportation-related legislation-1900-1950 -- Appendix C: Compendium of federal transportation-related legislation-1951-2000 -- Appendix D: Compendium of federal transportation-related legislation-2000+ -- References -- 4 - Who are the parties involved and what are their relationships?∗ -- 4.1 Introduction -- 4.1.1 Case scenario -- 4.2 Modal partners -- 4.2.1 Aviation -- 4.2.2 Bus and rail transit -- 4.2.3 Freight and passenger rail -- 4.2.4 Highway and motor carriers -- 4.2.4.1 Infrastructure ownership -- 4.2.5 Intermodal -- 4.2.6 Maritime -- 4.2.7 Pipelines -- 4.3 Cooperative and partnered security programs and initiatives -- 4.3.1 Cross-sector dependencies -- 4.3.2 Chemical sector</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">4.3.3 Transportation dependencies -- 4.3.4 Visible Intermodal Prevention and Response -- 4.3.5 Container Security Initiative -- 4.3.6 Certified Cargo Screening Program -- 4.3.7 Customs Trade Partnership Against Terrorism -- 4.3.8 Private and public sector cooperation -- 4.4 Summary -- References -- 5 - Components and economics of transportation security -- 5.1 Introduction -- 5.1.1 Derived demand -- 5.1.2 Dual production -- 5.1.3 Spatial and temporal utility -- 5.1.4 Transit time -- 5.1.5 Complexity -- 5.1.6 A primer on protection -- 5.2 The nature of transportation infrastructure -- 5.2.1 Infrastructure specifics -- 5.3 Analysis of benefits -- 5.4 Dictated infrastructure -- 5.5 Safety and security -- 5.6 Transit time -- 5.7 Economic effects and goods -- 5.8 Total cost of ownership: Initial costs and ongoing maintenance expenses -- 5.9 Asset utilization -- 5.10 Mutual aid -- 5.11 Intermodal operations -- 5.12 Adding protective assets -- 5.13 The problem of scale -- 5.14 Determining probability -- 5.15 Summary -- References -- Suggested additional reference materials -- II - Exposure -- 6 - Nature of transported people and goods -- 6.1 Introduction -- 6.2 Transporting people -- 6.2.1 Transporting for employment -- 6.2.2 Transporting for nonvocational commercial activity -- 6.2.3 Transporting for social purposes -- 6.2.4 Transporting for and as entertainment -- 6.2.5 Secondary incidental purposes -- 6.3 Freight -- 6.3.1 Finished products -- 6.3.2 Semifinished products -- 6.3.3 Refined materials -- 6.3.4 Basic materials -- 6.4 Modal attributes -- 6.4.1 Accessibility -- 6.4.2 Capability -- 6.4.3 Ease of arrangement -- 6.4.4 Transit time -- 6.4.5 Reliability -- 6.4.6 Price and cost -- 6.4.7 Security -- 6.5 Security concerns according to supply chain tier -- 6.6 Summary -- References -- 7 - Threats, vulnerabilities, consequences, and risks</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">7.1 Introduction -- 7.2 Definitions -- 7.2.1 Threats -- 7.2.1.1 Multiple threats -- 7.2.1.2 Scope -- 7.2.2 Vulnerabilities -- 7.2.3 Consequences -- 7.2.4 Risk -- 7.3 Transportation infrastructure -- 7.3.1 Railroads -- 7.3.1.1 Rights-of-way -- 7.3.1.2 Train robbery -- 7.3.1.3 Stations and terminals -- 7.3.1.4 Hazmat-loaded railcars -- 7.3.1.5 Explosive devices -- 7.3.1.6 Maintenance facilities -- 7.3.1.7 Cyberattacks -- 7.3.2 Motor carriers -- 7.3.2.1 Hijacking and cargo theft -- 7.3.2.2 Transporting illegal cargo -- 7.3.2.3 Destruction of vehicles -- 7.3.3 Ocean maritime -- 7.3.3.1 Cyberthreats -- 7.3.3.2 Hijacking and piracy (risks at sea) -- 7.3.3.3 Compromised cargo -- 7.3.3.4 Malfunctioning navigational systems -- 7.3.3.5 Risks in port -- 7.3.4 Inland maritime -- 7.3.5 Aviation -- 7.3.5.1 Passenger terminals -- 7.3.5.2 Airfreight -- 7.3.5.3 Aircraft -- 7.3.5.4 Cyberattacks -- 7.3.6 Pipelines -- 7.3.6.1 Rights-of-way -- 7.3.6.2 Storage facilities -- 7.3.6.3 Cyberattacks -- 7.3.7 Transit -- 7.3.7.1 Passengers -- 7.3.7.2 Vehicles -- 7.3.7.3 Transit personnel -- 7.3.7.4 Cyberattacks -- 7.3.8 Let's not forget intermodal -- 7.4 Summary -- References -- 8 - Natural versus manmade disasters -- 8.1 Introduction -- 8.2 All-hazards Approach -- 8.3 Developing a common lexicon -- 8.4 Phases of emergencies or incidents1 -- 8.4.1 Planning -- 8.4.2 Preparedness -- 8.4.3 Transition from preparedness to response -- 8.4.4 Response -- 8.4.5 Recovery -- 8.4.6 Mitigation -- 8.5 Agencies -- 8.5.1 Federal government agencies -- 8.5.2 State, territorial, and local government agencies -- 8.6 Stakeholders -- 8.7 What should transportation organizations and stakeholders do? -- 8.7.1 Planning -- 8.7.2 Preparedness -- 8.7.3 Response -- 8.7.4 Recovery -- 8.7.5 Mitigation -- 8.8 Continuous preparedness -- 8.9 Summary -- Appendix A: Short glossary of emergency management terms</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">References -- 9 - Assessing risk -- 9.1 Introduction -- 9.2 What are the risks to transportation systems? -- 9.2.1 Railroads -- 9.2.2 Transit -- 9.2.3 Highway/motor carriers -- 9.2.4 Pipelines -- 9.2.5 Aviation -- 9.2.6 Maritime operations -- 9.3 Assessing risk -- 9.3.1 Qualitatively assessing risk -- 9.3.1.1 Modified CARVER model -- 9.3.2 Quantitatively assessing risk -- 9.3.2.1 Blue Ribbon panel method -- 9.3.2.2 TSA risk management analysis tool -- 9.3.2.3 Rail corridor risk assessment system -- 9.3.2.4 Maritime security risk assessment method -- 9.3.2.5 Pipeline risk assessment models -- 9.3.2.6 Transit risk assessments -- 9.3.2.7 Risk assessment similarities and differences -- 9.4 Future assessment needs -- References -- 10 - Cyber threats and risks -- 10.1 Introduction to cybersecurity threats and transportation -- 10.1.1 Overview -- 10.1.2 Outsider versus insider threats -- 10.1.3 What are the objectives? -- 10.2 How we got to where we are -- 10.2.1 Some working definitions -- 10.2.2 IT and OT convergence -- 10.3 Modal-specific IT and OT systems -- 10.3.1 Aviation -- 10.3.1.1 Segment overview -- 10.3.1.2 Some key risks and vulnerabilities -- 10.3.2 Maritime transportation -- 10.3.2.1 Seagoing maritime transportation -- 10.3.2.2 Cyber risk for seagoing maritime transportation -- 10.3.2.3 Inland maritime transportation -- 10.3.2.4 Cyber risk for inland maritime transportation -- 10.3.3 Railroad transportation -- 10.3.3.1 Cyber risk for railroad transportation -- 10.3.4 Highway transportation -- 10.3.4.1 Cyber risk for highway transportation -- 10.3.5 Rail and bus transit -- 10.3.6 Pipeline transportation -- 10.3.6.1 Cyber risk for pipeline transportation -- 10.4 Common threads means common threats -- 10.5 Generic means of protecting from cyberattacks -- 10.5.1 Cybersecurity policies -- 10.5.2 Early detection processes</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">10.5.3 Responses to cyberattack</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Young, Richard R.</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Gordon, Gary A.</subfield><subfield code="t">Securing Integrated Transportation Networks</subfield><subfield code="d">Chantilly : Elsevier,c2024</subfield><subfield code="z">9780323954099</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035439485</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/hwr/detail.action?docID=31354283</subfield><subfield code="l">DE-2070s</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">HWR_PDA_PQE</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV050102323 |
illustrated | Not Illustrated |
indexdate | 2024-12-18T19:05:07Z |
institution | BVB |
isbn | 9780323954082 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035439485 |
oclc_num | 1435926105 |
open_access_boolean | |
owner | DE-2070s |
owner_facet | DE-2070s |
physical | 1 Online-Ressource (436 Seiten) |
psigel | ZDB-30-PQE ZDB-30-PQE HWR_PDA_PQE |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Elsevier |
record_format | marc |
spelling | Gordon, Gary A. Verfasser aut Securing Integrated Transportation Networks 1st ed Chantilly Elsevier 2024 ©2024 1 Online-Ressource (436 Seiten) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources Front Cover -- SECURING INTEGRATED TRANSPORTATION NETWORKS -- SECURING INTEGRATED TRANSPORTATION NETWORKS -- Copyright -- Contents -- Foreword -- Acknowledgments -- I - The evolution of transportation security -- 1 - Overview of transportation and why we want to secure it∗ -- Prologue -- 1.1 What is transportation? -- 1.2 Freight transportation -- 1.2.1 International transportation -- 1.3 Moving people -- 1.4 Components of transportation -- 1.4.1 Rights of way -- 1.4.2 Vehicles -- 1.5 What is transportation infrastructure? -- 1.5.1 Infrastructure and operations -- 1.5.2 Scheduling: How it shapes operations -- 1.5.3 How operations shape it -- 1.5.4 Unique challenges of infrastructure -- 1.5.4.1 Useful life -- 1.5.4.2 Financial concerns -- 1.5.4.3 Safety and security -- 1.6 Evolution of transportation modes -- 1.7 Cybersystem dependence -- 1.8 Threats and vulnerabilities overview -- 1.8.1 Natural disasters -- 1.8.2 Manmade disasters -- 1.8.3 Combined threats -- 1.9 Securing transportation infrastructure and operations -- 1.9.1 Human impact (movement of people) -- 1.9.2 Economic impact (movement of goods) -- References -- 2 - Transportation security before and after 9/11 -- 2.1 Introduction -- 2.2 Transportation security: A little history -- 2.3 Protecting the railroads -- 2.3.1 Railroads in wartime -- 2.4 Shifts in modal preferences -- 2.5 Intermodalism -- 2.6 Protecting transportation infrastructure -- 2.6.1 Historical development -- 2.6.2 Terrorism and changing international trade forever -- 2.7 Enhancing initiatives with cross-sector alliances -- 2.7.1 Alliances, both public and private -- 2.7.2 Internationalization of trade alliances -- 2.7.3 Private-private alliances -- 2.8 Summary -- References -- 3 - Federal agencies-Regulation and the promotion of economic growth -- 3.1 Introduction -- 3.2 A complex evolution 3.3 Railroads: Where it all began -- 3.3.1 Economic regulation -- 3.3.2 Safety regulation -- 3.3.3 Security regulation -- 3.4 Motor carriers: Protecting a nascent industry -- 3.4.1 Promoting highways -- 3.4.2 Economic regulation -- 3.4.3 Safety regulation -- 3.4.4 Security regulation -- 3.5 Transit: A formerly embedded activity -- 3.5.1 Deemphasizing the automobile -- 3.5.2 Safety regulation -- 3.5.3 Security regulation -- 3.6 Aviation: Bifurcation of economic and safety regulations -- 3.6.1 Economic regulation -- 3.6.2 Safety regulation -- 3.6.3 Security regulation -- 3.7 Ocean maritime shipping -- 3.7.1 Promotion of seaborne commerce -- 3.7.2 Economic regulation -- 3.7.3 Safety regulation -- 3.7.4 Security regulation -- 3.8 Inland maritime shipping -- 3.8.1 Economic regulation -- 3.8.2 Safety regulation -- 3.8.3 Security regulation -- 3.9 Pipelines -- 3.9.1 Economic regulation -- 3.9.2 Safety regulation -- 3.9.3 Security regulation -- 3.10 Let's not forget intermodal -- 3.11 Sorting out the federal agencies -- 3.12 Summary -- Appendix A: Compendium of federal transportation-related legislation-1800s -- Appendix B: Compendium of federal transportation-related legislation-1900-1950 -- Appendix C: Compendium of federal transportation-related legislation-1951-2000 -- Appendix D: Compendium of federal transportation-related legislation-2000+ -- References -- 4 - Who are the parties involved and what are their relationships?∗ -- 4.1 Introduction -- 4.1.1 Case scenario -- 4.2 Modal partners -- 4.2.1 Aviation -- 4.2.2 Bus and rail transit -- 4.2.3 Freight and passenger rail -- 4.2.4 Highway and motor carriers -- 4.2.4.1 Infrastructure ownership -- 4.2.5 Intermodal -- 4.2.6 Maritime -- 4.2.7 Pipelines -- 4.3 Cooperative and partnered security programs and initiatives -- 4.3.1 Cross-sector dependencies -- 4.3.2 Chemical sector 4.3.3 Transportation dependencies -- 4.3.4 Visible Intermodal Prevention and Response -- 4.3.5 Container Security Initiative -- 4.3.6 Certified Cargo Screening Program -- 4.3.7 Customs Trade Partnership Against Terrorism -- 4.3.8 Private and public sector cooperation -- 4.4 Summary -- References -- 5 - Components and economics of transportation security -- 5.1 Introduction -- 5.1.1 Derived demand -- 5.1.2 Dual production -- 5.1.3 Spatial and temporal utility -- 5.1.4 Transit time -- 5.1.5 Complexity -- 5.1.6 A primer on protection -- 5.2 The nature of transportation infrastructure -- 5.2.1 Infrastructure specifics -- 5.3 Analysis of benefits -- 5.4 Dictated infrastructure -- 5.5 Safety and security -- 5.6 Transit time -- 5.7 Economic effects and goods -- 5.8 Total cost of ownership: Initial costs and ongoing maintenance expenses -- 5.9 Asset utilization -- 5.10 Mutual aid -- 5.11 Intermodal operations -- 5.12 Adding protective assets -- 5.13 The problem of scale -- 5.14 Determining probability -- 5.15 Summary -- References -- Suggested additional reference materials -- II - Exposure -- 6 - Nature of transported people and goods -- 6.1 Introduction -- 6.2 Transporting people -- 6.2.1 Transporting for employment -- 6.2.2 Transporting for nonvocational commercial activity -- 6.2.3 Transporting for social purposes -- 6.2.4 Transporting for and as entertainment -- 6.2.5 Secondary incidental purposes -- 6.3 Freight -- 6.3.1 Finished products -- 6.3.2 Semifinished products -- 6.3.3 Refined materials -- 6.3.4 Basic materials -- 6.4 Modal attributes -- 6.4.1 Accessibility -- 6.4.2 Capability -- 6.4.3 Ease of arrangement -- 6.4.4 Transit time -- 6.4.5 Reliability -- 6.4.6 Price and cost -- 6.4.7 Security -- 6.5 Security concerns according to supply chain tier -- 6.6 Summary -- References -- 7 - Threats, vulnerabilities, consequences, and risks 7.1 Introduction -- 7.2 Definitions -- 7.2.1 Threats -- 7.2.1.1 Multiple threats -- 7.2.1.2 Scope -- 7.2.2 Vulnerabilities -- 7.2.3 Consequences -- 7.2.4 Risk -- 7.3 Transportation infrastructure -- 7.3.1 Railroads -- 7.3.1.1 Rights-of-way -- 7.3.1.2 Train robbery -- 7.3.1.3 Stations and terminals -- 7.3.1.4 Hazmat-loaded railcars -- 7.3.1.5 Explosive devices -- 7.3.1.6 Maintenance facilities -- 7.3.1.7 Cyberattacks -- 7.3.2 Motor carriers -- 7.3.2.1 Hijacking and cargo theft -- 7.3.2.2 Transporting illegal cargo -- 7.3.2.3 Destruction of vehicles -- 7.3.3 Ocean maritime -- 7.3.3.1 Cyberthreats -- 7.3.3.2 Hijacking and piracy (risks at sea) -- 7.3.3.3 Compromised cargo -- 7.3.3.4 Malfunctioning navigational systems -- 7.3.3.5 Risks in port -- 7.3.4 Inland maritime -- 7.3.5 Aviation -- 7.3.5.1 Passenger terminals -- 7.3.5.2 Airfreight -- 7.3.5.3 Aircraft -- 7.3.5.4 Cyberattacks -- 7.3.6 Pipelines -- 7.3.6.1 Rights-of-way -- 7.3.6.2 Storage facilities -- 7.3.6.3 Cyberattacks -- 7.3.7 Transit -- 7.3.7.1 Passengers -- 7.3.7.2 Vehicles -- 7.3.7.3 Transit personnel -- 7.3.7.4 Cyberattacks -- 7.3.8 Let's not forget intermodal -- 7.4 Summary -- References -- 8 - Natural versus manmade disasters -- 8.1 Introduction -- 8.2 All-hazards Approach -- 8.3 Developing a common lexicon -- 8.4 Phases of emergencies or incidents1 -- 8.4.1 Planning -- 8.4.2 Preparedness -- 8.4.3 Transition from preparedness to response -- 8.4.4 Response -- 8.4.5 Recovery -- 8.4.6 Mitigation -- 8.5 Agencies -- 8.5.1 Federal government agencies -- 8.5.2 State, territorial, and local government agencies -- 8.6 Stakeholders -- 8.7 What should transportation organizations and stakeholders do? -- 8.7.1 Planning -- 8.7.2 Preparedness -- 8.7.3 Response -- 8.7.4 Recovery -- 8.7.5 Mitigation -- 8.8 Continuous preparedness -- 8.9 Summary -- Appendix A: Short glossary of emergency management terms References -- 9 - Assessing risk -- 9.1 Introduction -- 9.2 What are the risks to transportation systems? -- 9.2.1 Railroads -- 9.2.2 Transit -- 9.2.3 Highway/motor carriers -- 9.2.4 Pipelines -- 9.2.5 Aviation -- 9.2.6 Maritime operations -- 9.3 Assessing risk -- 9.3.1 Qualitatively assessing risk -- 9.3.1.1 Modified CARVER model -- 9.3.2 Quantitatively assessing risk -- 9.3.2.1 Blue Ribbon panel method -- 9.3.2.2 TSA risk management analysis tool -- 9.3.2.3 Rail corridor risk assessment system -- 9.3.2.4 Maritime security risk assessment method -- 9.3.2.5 Pipeline risk assessment models -- 9.3.2.6 Transit risk assessments -- 9.3.2.7 Risk assessment similarities and differences -- 9.4 Future assessment needs -- References -- 10 - Cyber threats and risks -- 10.1 Introduction to cybersecurity threats and transportation -- 10.1.1 Overview -- 10.1.2 Outsider versus insider threats -- 10.1.3 What are the objectives? -- 10.2 How we got to where we are -- 10.2.1 Some working definitions -- 10.2.2 IT and OT convergence -- 10.3 Modal-specific IT and OT systems -- 10.3.1 Aviation -- 10.3.1.1 Segment overview -- 10.3.1.2 Some key risks and vulnerabilities -- 10.3.2 Maritime transportation -- 10.3.2.1 Seagoing maritime transportation -- 10.3.2.2 Cyber risk for seagoing maritime transportation -- 10.3.2.3 Inland maritime transportation -- 10.3.2.4 Cyber risk for inland maritime transportation -- 10.3.3 Railroad transportation -- 10.3.3.1 Cyber risk for railroad transportation -- 10.3.4 Highway transportation -- 10.3.4.1 Cyber risk for highway transportation -- 10.3.5 Rail and bus transit -- 10.3.6 Pipeline transportation -- 10.3.6.1 Cyber risk for pipeline transportation -- 10.4 Common threads means common threats -- 10.5 Generic means of protecting from cyberattacks -- 10.5.1 Cybersecurity policies -- 10.5.2 Early detection processes 10.5.3 Responses to cyberattack Young, Richard R. Sonstige oth Erscheint auch als Druck-Ausgabe Gordon, Gary A. Securing Integrated Transportation Networks Chantilly : Elsevier,c2024 9780323954099 |
spellingShingle | Gordon, Gary A. Securing Integrated Transportation Networks Front Cover -- SECURING INTEGRATED TRANSPORTATION NETWORKS -- SECURING INTEGRATED TRANSPORTATION NETWORKS -- Copyright -- Contents -- Foreword -- Acknowledgments -- I - The evolution of transportation security -- 1 - Overview of transportation and why we want to secure it∗ -- Prologue -- 1.1 What is transportation? -- 1.2 Freight transportation -- 1.2.1 International transportation -- 1.3 Moving people -- 1.4 Components of transportation -- 1.4.1 Rights of way -- 1.4.2 Vehicles -- 1.5 What is transportation infrastructure? -- 1.5.1 Infrastructure and operations -- 1.5.2 Scheduling: How it shapes operations -- 1.5.3 How operations shape it -- 1.5.4 Unique challenges of infrastructure -- 1.5.4.1 Useful life -- 1.5.4.2 Financial concerns -- 1.5.4.3 Safety and security -- 1.6 Evolution of transportation modes -- 1.7 Cybersystem dependence -- 1.8 Threats and vulnerabilities overview -- 1.8.1 Natural disasters -- 1.8.2 Manmade disasters -- 1.8.3 Combined threats -- 1.9 Securing transportation infrastructure and operations -- 1.9.1 Human impact (movement of people) -- 1.9.2 Economic impact (movement of goods) -- References -- 2 - Transportation security before and after 9/11 -- 2.1 Introduction -- 2.2 Transportation security: A little history -- 2.3 Protecting the railroads -- 2.3.1 Railroads in wartime -- 2.4 Shifts in modal preferences -- 2.5 Intermodalism -- 2.6 Protecting transportation infrastructure -- 2.6.1 Historical development -- 2.6.2 Terrorism and changing international trade forever -- 2.7 Enhancing initiatives with cross-sector alliances -- 2.7.1 Alliances, both public and private -- 2.7.2 Internationalization of trade alliances -- 2.7.3 Private-private alliances -- 2.8 Summary -- References -- 3 - Federal agencies-Regulation and the promotion of economic growth -- 3.1 Introduction -- 3.2 A complex evolution 3.3 Railroads: Where it all began -- 3.3.1 Economic regulation -- 3.3.2 Safety regulation -- 3.3.3 Security regulation -- 3.4 Motor carriers: Protecting a nascent industry -- 3.4.1 Promoting highways -- 3.4.2 Economic regulation -- 3.4.3 Safety regulation -- 3.4.4 Security regulation -- 3.5 Transit: A formerly embedded activity -- 3.5.1 Deemphasizing the automobile -- 3.5.2 Safety regulation -- 3.5.3 Security regulation -- 3.6 Aviation: Bifurcation of economic and safety regulations -- 3.6.1 Economic regulation -- 3.6.2 Safety regulation -- 3.6.3 Security regulation -- 3.7 Ocean maritime shipping -- 3.7.1 Promotion of seaborne commerce -- 3.7.2 Economic regulation -- 3.7.3 Safety regulation -- 3.7.4 Security regulation -- 3.8 Inland maritime shipping -- 3.8.1 Economic regulation -- 3.8.2 Safety regulation -- 3.8.3 Security regulation -- 3.9 Pipelines -- 3.9.1 Economic regulation -- 3.9.2 Safety regulation -- 3.9.3 Security regulation -- 3.10 Let's not forget intermodal -- 3.11 Sorting out the federal agencies -- 3.12 Summary -- Appendix A: Compendium of federal transportation-related legislation-1800s -- Appendix B: Compendium of federal transportation-related legislation-1900-1950 -- Appendix C: Compendium of federal transportation-related legislation-1951-2000 -- Appendix D: Compendium of federal transportation-related legislation-2000+ -- References -- 4 - Who are the parties involved and what are their relationships?∗ -- 4.1 Introduction -- 4.1.1 Case scenario -- 4.2 Modal partners -- 4.2.1 Aviation -- 4.2.2 Bus and rail transit -- 4.2.3 Freight and passenger rail -- 4.2.4 Highway and motor carriers -- 4.2.4.1 Infrastructure ownership -- 4.2.5 Intermodal -- 4.2.6 Maritime -- 4.2.7 Pipelines -- 4.3 Cooperative and partnered security programs and initiatives -- 4.3.1 Cross-sector dependencies -- 4.3.2 Chemical sector 4.3.3 Transportation dependencies -- 4.3.4 Visible Intermodal Prevention and Response -- 4.3.5 Container Security Initiative -- 4.3.6 Certified Cargo Screening Program -- 4.3.7 Customs Trade Partnership Against Terrorism -- 4.3.8 Private and public sector cooperation -- 4.4 Summary -- References -- 5 - Components and economics of transportation security -- 5.1 Introduction -- 5.1.1 Derived demand -- 5.1.2 Dual production -- 5.1.3 Spatial and temporal utility -- 5.1.4 Transit time -- 5.1.5 Complexity -- 5.1.6 A primer on protection -- 5.2 The nature of transportation infrastructure -- 5.2.1 Infrastructure specifics -- 5.3 Analysis of benefits -- 5.4 Dictated infrastructure -- 5.5 Safety and security -- 5.6 Transit time -- 5.7 Economic effects and goods -- 5.8 Total cost of ownership: Initial costs and ongoing maintenance expenses -- 5.9 Asset utilization -- 5.10 Mutual aid -- 5.11 Intermodal operations -- 5.12 Adding protective assets -- 5.13 The problem of scale -- 5.14 Determining probability -- 5.15 Summary -- References -- Suggested additional reference materials -- II - Exposure -- 6 - Nature of transported people and goods -- 6.1 Introduction -- 6.2 Transporting people -- 6.2.1 Transporting for employment -- 6.2.2 Transporting for nonvocational commercial activity -- 6.2.3 Transporting for social purposes -- 6.2.4 Transporting for and as entertainment -- 6.2.5 Secondary incidental purposes -- 6.3 Freight -- 6.3.1 Finished products -- 6.3.2 Semifinished products -- 6.3.3 Refined materials -- 6.3.4 Basic materials -- 6.4 Modal attributes -- 6.4.1 Accessibility -- 6.4.2 Capability -- 6.4.3 Ease of arrangement -- 6.4.4 Transit time -- 6.4.5 Reliability -- 6.4.6 Price and cost -- 6.4.7 Security -- 6.5 Security concerns according to supply chain tier -- 6.6 Summary -- References -- 7 - Threats, vulnerabilities, consequences, and risks 7.1 Introduction -- 7.2 Definitions -- 7.2.1 Threats -- 7.2.1.1 Multiple threats -- 7.2.1.2 Scope -- 7.2.2 Vulnerabilities -- 7.2.3 Consequences -- 7.2.4 Risk -- 7.3 Transportation infrastructure -- 7.3.1 Railroads -- 7.3.1.1 Rights-of-way -- 7.3.1.2 Train robbery -- 7.3.1.3 Stations and terminals -- 7.3.1.4 Hazmat-loaded railcars -- 7.3.1.5 Explosive devices -- 7.3.1.6 Maintenance facilities -- 7.3.1.7 Cyberattacks -- 7.3.2 Motor carriers -- 7.3.2.1 Hijacking and cargo theft -- 7.3.2.2 Transporting illegal cargo -- 7.3.2.3 Destruction of vehicles -- 7.3.3 Ocean maritime -- 7.3.3.1 Cyberthreats -- 7.3.3.2 Hijacking and piracy (risks at sea) -- 7.3.3.3 Compromised cargo -- 7.3.3.4 Malfunctioning navigational systems -- 7.3.3.5 Risks in port -- 7.3.4 Inland maritime -- 7.3.5 Aviation -- 7.3.5.1 Passenger terminals -- 7.3.5.2 Airfreight -- 7.3.5.3 Aircraft -- 7.3.5.4 Cyberattacks -- 7.3.6 Pipelines -- 7.3.6.1 Rights-of-way -- 7.3.6.2 Storage facilities -- 7.3.6.3 Cyberattacks -- 7.3.7 Transit -- 7.3.7.1 Passengers -- 7.3.7.2 Vehicles -- 7.3.7.3 Transit personnel -- 7.3.7.4 Cyberattacks -- 7.3.8 Let's not forget intermodal -- 7.4 Summary -- References -- 8 - Natural versus manmade disasters -- 8.1 Introduction -- 8.2 All-hazards Approach -- 8.3 Developing a common lexicon -- 8.4 Phases of emergencies or incidents1 -- 8.4.1 Planning -- 8.4.2 Preparedness -- 8.4.3 Transition from preparedness to response -- 8.4.4 Response -- 8.4.5 Recovery -- 8.4.6 Mitigation -- 8.5 Agencies -- 8.5.1 Federal government agencies -- 8.5.2 State, territorial, and local government agencies -- 8.6 Stakeholders -- 8.7 What should transportation organizations and stakeholders do? -- 8.7.1 Planning -- 8.7.2 Preparedness -- 8.7.3 Response -- 8.7.4 Recovery -- 8.7.5 Mitigation -- 8.8 Continuous preparedness -- 8.9 Summary -- Appendix A: Short glossary of emergency management terms References -- 9 - Assessing risk -- 9.1 Introduction -- 9.2 What are the risks to transportation systems? -- 9.2.1 Railroads -- 9.2.2 Transit -- 9.2.3 Highway/motor carriers -- 9.2.4 Pipelines -- 9.2.5 Aviation -- 9.2.6 Maritime operations -- 9.3 Assessing risk -- 9.3.1 Qualitatively assessing risk -- 9.3.1.1 Modified CARVER model -- 9.3.2 Quantitatively assessing risk -- 9.3.2.1 Blue Ribbon panel method -- 9.3.2.2 TSA risk management analysis tool -- 9.3.2.3 Rail corridor risk assessment system -- 9.3.2.4 Maritime security risk assessment method -- 9.3.2.5 Pipeline risk assessment models -- 9.3.2.6 Transit risk assessments -- 9.3.2.7 Risk assessment similarities and differences -- 9.4 Future assessment needs -- References -- 10 - Cyber threats and risks -- 10.1 Introduction to cybersecurity threats and transportation -- 10.1.1 Overview -- 10.1.2 Outsider versus insider threats -- 10.1.3 What are the objectives? -- 10.2 How we got to where we are -- 10.2.1 Some working definitions -- 10.2.2 IT and OT convergence -- 10.3 Modal-specific IT and OT systems -- 10.3.1 Aviation -- 10.3.1.1 Segment overview -- 10.3.1.2 Some key risks and vulnerabilities -- 10.3.2 Maritime transportation -- 10.3.2.1 Seagoing maritime transportation -- 10.3.2.2 Cyber risk for seagoing maritime transportation -- 10.3.2.3 Inland maritime transportation -- 10.3.2.4 Cyber risk for inland maritime transportation -- 10.3.3 Railroad transportation -- 10.3.3.1 Cyber risk for railroad transportation -- 10.3.4 Highway transportation -- 10.3.4.1 Cyber risk for highway transportation -- 10.3.5 Rail and bus transit -- 10.3.6 Pipeline transportation -- 10.3.6.1 Cyber risk for pipeline transportation -- 10.4 Common threads means common threats -- 10.5 Generic means of protecting from cyberattacks -- 10.5.1 Cybersecurity policies -- 10.5.2 Early detection processes 10.5.3 Responses to cyberattack |
title | Securing Integrated Transportation Networks |
title_auth | Securing Integrated Transportation Networks |
title_exact_search | Securing Integrated Transportation Networks |
title_full | Securing Integrated Transportation Networks |
title_fullStr | Securing Integrated Transportation Networks |
title_full_unstemmed | Securing Integrated Transportation Networks |
title_short | Securing Integrated Transportation Networks |
title_sort | securing integrated transportation networks |
work_keys_str_mv | AT gordongarya securingintegratedtransportationnetworks AT youngrichardr securingintegratedtransportationnetworks |