National critical infrastructure policy :: background and select cybersecurity issues /
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
New York :
Nova Publishers,
[2016]
|
Schriftenreihe: | Defense, security and strategy series.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Beschreibung: | 1 online resource |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781634847575 1634847571 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBU-ocn947837594 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 160615s2016 nyu ob 001 0 eng | ||
010 | |a 2019721300 | ||
040 | |a DLC |b eng |e rda |e pn |c DLC |d N$T |d YDX |d SNK |d DKU |d AUW |d IGB |d D6H |d OCLCF |d VTS |d AGLDB |d G3B |d S8J |d S9I |d STF |d VLY |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 958083983 |a 958392401 | ||
020 | |a 9781634847575 |q (pdf) | ||
020 | |a 1634847571 | ||
020 | |z 1634847563 | ||
020 | |z 9781634847568 | ||
035 | |a (OCoLC)947837594 |z (OCoLC)958083983 |z (OCoLC)958392401 | ||
043 | |a n-us--- | ||
050 | 4 | |a HV6773.15.C97 | |
072 | 7 | |a BUS |x 032000 |2 bisacsh | |
072 | 7 | |a SOC |x 000000 |2 bisacsh | |
082 | 7 | |a 363.325 |2 23 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a National critical infrastructure policy : |b background and select cybersecurity issues / |c Sheldon Yates, editor. |
264 | 1 | |a New York : |b Nova Publishers, |c [2016] | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
490 | 1 | |a Defense, security and strategies | |
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a NATIONAL CRITICAL INFRASTRUCTURE POLICY BACKGROUND AND SELECT CYBERSECURITY ISSUES ; NATIONAL CRITICAL INFRASTRUCTURE POLICY BACKGROUND AND SELECT CYBERSECURITY ISSUES ; Library of Congress Cataloging-in-Publication Data; CONTENTS ; PREFACE ; Chapter 1 CRITICAL INFRASTRUCTURES: BACKGROUND, POLICY, AND IMPLEMENTATION* ; Summary; Introduction; Federal Critical Infrastructure Protection Policy: In Brief; The President's Commission on Critical Infrastructure Protection; Presidential Decision Directive No. 63; Restructuring by the Bush Administration; Pre-September 11; Post-September 11 | |
505 | 8 | |a Executive OrdersNational Strategy for Homeland Security; HSPD-7; The Obama Administration; Initial Efforts; Cybersecurity Legislation and Executive Orders; PPD-21; Department of Homeland Security; Initial Establishment; Second Stage Review Reorganization; Post-Katrina Emergency Management Reform Act of 2006; Continued Organizational Evolution; Policy Implementation; Government-Sector Coordination; National Critical Infrastructure Plan; Information Sharing and Analysis Center (ISAC); Identifying Critical Assets, Assessing Vulnerability and Risk, and Prioritizing Protective Measures | |
505 | 8 | |a Cybersecurity FrameworkIssues and Discussion; Information Sharing; Regulation; Appendix. Funding for Critical Infrastructure; Federal Funding for Critical Infrastructure Protection; FY2016 DHS Budget Request and Prior Year Appropriations for Infrastructure Protection and Information Security Program and Other Relevant DHS Budget Activities; IPIS; Other Infrastructure Related Programs; End Notes; Chapter 2 THE 2013 CYBERSECURITY EXECUTIVE ORDER: OVERVIEW AND CONSIDERATIONS FOR CONGRESS ; Summary; Background: Threats and Consequences; Cyberthreats; Cyberterrorists; Cyberspies; Cyberthieves | |
505 | 8 | |a CyberwarriorsCyberhacktivists; Cyberthreats and Implications for U.S. Policy; Overview of the Executive Order; Information Sharing; Voluntary Cybersecurity Framework; Other Provisions; E.O. 13636 Implementation Deliverables and Deadlines; June 12, 2013; July 12, 2013; October 10, 2013; February 12, 2014; May 13, 2014; February 12, 2016; Relationship of the Executive Order to Presidential Policy Directive 21; PPD 21 Implementation Deliverables and Deadlines; June 12, 2013; July 12, 2013; August 11, 2013; October 10, 2013; February 12, 2015; Scope of Presidential Authority | |
505 | 8 | |a Relationship to Legislative ProposalsReactions to the Executive Order; End Notes; Chapter 3 CYBERSECURITY ISSUES FOR THE BULK POWER SYSTEM* ; Summary; Introduction; Grid Components and Potential Vulnerabilities; Electric Utility Industrial Control Systems; Supervisory Control and Data Acquisition Systems; Distributed Control Systems; Modernization and the Smart Grid; Other Potential Vulnerabilities; Distributed Generation; Smart Meters; Supply Chains; The Grid Is Experiencing Cyber Intrusions; BlackEnergy; HAVEX; Sandworm; Mandatory Bulk Power Cybersecurity Standards | |
650 | 0 | |a Cyberterrorism |z United States |x Prevention. | |
650 | 7 | |a BUSINESS & ECONOMICS |x Infrastructure. |2 bisacsh | |
650 | 7 | |a SOCIAL SCIENCE |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |x Government policy |2 fast | |
650 | 7 | |a Cyberterrorism |x Prevention |2 fast | |
651 | 7 | |a United States |2 fast |1 https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq | |
700 | 1 | |a Yates, Sheldon, |e editor. | |
776 | 0 | 8 | |i Print version: |t National critical infrastructure policy. |d New York : Nova Publishers, [2016] |z 1634847563 |w (DLC) 2016302276 |
830 | 0 | |a Defense, security and strategy series. |0 http://id.loc.gov/authorities/names/no2010078560 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBU |q FWS_PDA_EBU |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1226205 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 1226205 | ||
938 | |a YBP Library Services |b YANK |n 12882098 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBU | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBU-ocn947837594 |
---|---|
_version_ | 1816796922532331520 |
adam_text | |
any_adam_object | |
author2 | Yates, Sheldon |
author2_role | edt |
author2_variant | s y sy |
author_facet | Yates, Sheldon |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HV6773 |
callnumber-raw | HV6773.15.C97 |
callnumber-search | HV6773.15.C97 |
callnumber-sort | HV 46773.15 C97 |
callnumber-subject | HV - Social Pathology, Criminology |
collection | ZDB-4-EBU |
contents | NATIONAL CRITICAL INFRASTRUCTURE POLICY BACKGROUND AND SELECT CYBERSECURITY ISSUES ; NATIONAL CRITICAL INFRASTRUCTURE POLICY BACKGROUND AND SELECT CYBERSECURITY ISSUES ; Library of Congress Cataloging-in-Publication Data; CONTENTS ; PREFACE ; Chapter 1 CRITICAL INFRASTRUCTURES: BACKGROUND, POLICY, AND IMPLEMENTATION* ; Summary; Introduction; Federal Critical Infrastructure Protection Policy: In Brief; The President's Commission on Critical Infrastructure Protection; Presidential Decision Directive No. 63; Restructuring by the Bush Administration; Pre-September 11; Post-September 11 Executive OrdersNational Strategy for Homeland Security; HSPD-7; The Obama Administration; Initial Efforts; Cybersecurity Legislation and Executive Orders; PPD-21; Department of Homeland Security; Initial Establishment; Second Stage Review Reorganization; Post-Katrina Emergency Management Reform Act of 2006; Continued Organizational Evolution; Policy Implementation; Government-Sector Coordination; National Critical Infrastructure Plan; Information Sharing and Analysis Center (ISAC); Identifying Critical Assets, Assessing Vulnerability and Risk, and Prioritizing Protective Measures Cybersecurity FrameworkIssues and Discussion; Information Sharing; Regulation; Appendix. Funding for Critical Infrastructure; Federal Funding for Critical Infrastructure Protection; FY2016 DHS Budget Request and Prior Year Appropriations for Infrastructure Protection and Information Security Program and Other Relevant DHS Budget Activities; IPIS; Other Infrastructure Related Programs; End Notes; Chapter 2 THE 2013 CYBERSECURITY EXECUTIVE ORDER: OVERVIEW AND CONSIDERATIONS FOR CONGRESS ; Summary; Background: Threats and Consequences; Cyberthreats; Cyberterrorists; Cyberspies; Cyberthieves CyberwarriorsCyberhacktivists; Cyberthreats and Implications for U.S. Policy; Overview of the Executive Order; Information Sharing; Voluntary Cybersecurity Framework; Other Provisions; E.O. 13636 Implementation Deliverables and Deadlines; June 12, 2013; July 12, 2013; October 10, 2013; February 12, 2014; May 13, 2014; February 12, 2016; Relationship of the Executive Order to Presidential Policy Directive 21; PPD 21 Implementation Deliverables and Deadlines; June 12, 2013; July 12, 2013; August 11, 2013; October 10, 2013; February 12, 2015; Scope of Presidential Authority Relationship to Legislative ProposalsReactions to the Executive Order; End Notes; Chapter 3 CYBERSECURITY ISSUES FOR THE BULK POWER SYSTEM* ; Summary; Introduction; Grid Components and Potential Vulnerabilities; Electric Utility Industrial Control Systems; Supervisory Control and Data Acquisition Systems; Distributed Control Systems; Modernization and the Smart Grid; Other Potential Vulnerabilities; Distributed Generation; Smart Meters; Supply Chains; The Grid Is Experiencing Cyber Intrusions; BlackEnergy; HAVEX; Sandworm; Mandatory Bulk Power Cybersecurity Standards |
ctrlnum | (OCoLC)947837594 |
dewey-full | 363.325 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 363 - Other social problems and services |
dewey-raw | 363.325 |
dewey-search | 363.325 |
dewey-sort | 3363.325 |
dewey-tens | 360 - Social problems and services; associations |
discipline | Soziologie |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05218cam a2200601 i 4500</leader><controlfield tag="001">ZDB-4-EBU-ocn947837594</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">160615s2016 nyu ob 001 0 eng </controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a"> 2019721300</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DLC</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">DLC</subfield><subfield code="d">N$T</subfield><subfield code="d">YDX</subfield><subfield code="d">SNK</subfield><subfield code="d">DKU</subfield><subfield code="d">AUW</subfield><subfield code="d">IGB</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCF</subfield><subfield code="d">VTS</subfield><subfield code="d">AGLDB</subfield><subfield code="d">G3B</subfield><subfield code="d">S8J</subfield><subfield code="d">S9I</subfield><subfield code="d">STF</subfield><subfield code="d">VLY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">958083983</subfield><subfield code="a">958392401</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781634847575</subfield><subfield code="q">(pdf)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1634847571</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1634847563</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781634847568</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)947837594</subfield><subfield code="z">(OCoLC)958083983</subfield><subfield code="z">(OCoLC)958392401</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">n-us---</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HV6773.15.C97</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">BUS</subfield><subfield code="x">032000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SOC</subfield><subfield code="x">000000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">363.325</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">National critical infrastructure policy :</subfield><subfield code="b">background and select cybersecurity issues /</subfield><subfield code="c">Sheldon Yates, editor.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York :</subfield><subfield code="b">Nova Publishers,</subfield><subfield code="c">[2016]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Defense, security and strategies</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">NATIONAL CRITICAL INFRASTRUCTURE POLICY BACKGROUND AND SELECT CYBERSECURITY ISSUES ; NATIONAL CRITICAL INFRASTRUCTURE POLICY BACKGROUND AND SELECT CYBERSECURITY ISSUES ; Library of Congress Cataloging-in-Publication Data; CONTENTS ; PREFACE ; Chapter 1 CRITICAL INFRASTRUCTURES: BACKGROUND, POLICY, AND IMPLEMENTATION* ; Summary; Introduction; Federal Critical Infrastructure Protection Policy: In Brief; The President's Commission on Critical Infrastructure Protection; Presidential Decision Directive No. 63; Restructuring by the Bush Administration; Pre-September 11; Post-September 11</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Executive OrdersNational Strategy for Homeland Security; HSPD-7; The Obama Administration; Initial Efforts; Cybersecurity Legislation and Executive Orders; PPD-21; Department of Homeland Security; Initial Establishment; Second Stage Review Reorganization; Post-Katrina Emergency Management Reform Act of 2006; Continued Organizational Evolution; Policy Implementation; Government-Sector Coordination; National Critical Infrastructure Plan; Information Sharing and Analysis Center (ISAC); Identifying Critical Assets, Assessing Vulnerability and Risk, and Prioritizing Protective Measures</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Cybersecurity FrameworkIssues and Discussion; Information Sharing; Regulation; Appendix. Funding for Critical Infrastructure; Federal Funding for Critical Infrastructure Protection; FY2016 DHS Budget Request and Prior Year Appropriations for Infrastructure Protection and Information Security Program and Other Relevant DHS Budget Activities; IPIS; Other Infrastructure Related Programs; End Notes; Chapter 2 THE 2013 CYBERSECURITY EXECUTIVE ORDER: OVERVIEW AND CONSIDERATIONS FOR CONGRESS ; Summary; Background: Threats and Consequences; Cyberthreats; Cyberterrorists; Cyberspies; Cyberthieves</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">CyberwarriorsCyberhacktivists; Cyberthreats and Implications for U.S. Policy; Overview of the Executive Order; Information Sharing; Voluntary Cybersecurity Framework; Other Provisions; E.O. 13636 Implementation Deliverables and Deadlines; June 12, 2013; July 12, 2013; October 10, 2013; February 12, 2014; May 13, 2014; February 12, 2016; Relationship of the Executive Order to Presidential Policy Directive 21; PPD 21 Implementation Deliverables and Deadlines; June 12, 2013; July 12, 2013; August 11, 2013; October 10, 2013; February 12, 2015; Scope of Presidential Authority</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Relationship to Legislative ProposalsReactions to the Executive Order; End Notes; Chapter 3 CYBERSECURITY ISSUES FOR THE BULK POWER SYSTEM* ; Summary; Introduction; Grid Components and Potential Vulnerabilities; Electric Utility Industrial Control Systems; Supervisory Control and Data Acquisition Systems; Distributed Control Systems; Modernization and the Smart Grid; Other Potential Vulnerabilities; Distributed Generation; Smart Meters; Supply Chains; The Grid Is Experiencing Cyber Intrusions; BlackEnergy; HAVEX; Sandworm; Mandatory Bulk Power Cybersecurity Standards</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS</subfield><subfield code="x">Infrastructure.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SOCIAL SCIENCE</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Government policy</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">United States</subfield><subfield code="2">fast</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Yates, Sheldon,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">National critical infrastructure policy.</subfield><subfield code="d">New York : Nova Publishers, [2016]</subfield><subfield code="z">1634847563</subfield><subfield code="w">(DLC) 2016302276</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Defense, security and strategy series.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2010078560</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBU</subfield><subfield code="q">FWS_PDA_EBU</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1226205</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1226205</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">12882098</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBU</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
geographic | United States fast https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq |
geographic_facet | United States |
id | ZDB-4-EBU-ocn947837594 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:49:23Z |
institution | BVB |
isbn | 9781634847575 1634847571 |
language | English |
lccn | 2019721300 |
oclc_num | 947837594 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBU |
publishDate | 2016 |
publishDateSearch | 2016 |
publishDateSort | 2016 |
publisher | Nova Publishers, |
record_format | marc |
series | Defense, security and strategy series. |
series2 | Defense, security and strategies |
spelling | National critical infrastructure policy : background and select cybersecurity issues / Sheldon Yates, editor. New York : Nova Publishers, [2016] 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier data file Defense, security and strategies Includes bibliographical references and index. Print version record. NATIONAL CRITICAL INFRASTRUCTURE POLICY BACKGROUND AND SELECT CYBERSECURITY ISSUES ; NATIONAL CRITICAL INFRASTRUCTURE POLICY BACKGROUND AND SELECT CYBERSECURITY ISSUES ; Library of Congress Cataloging-in-Publication Data; CONTENTS ; PREFACE ; Chapter 1 CRITICAL INFRASTRUCTURES: BACKGROUND, POLICY, AND IMPLEMENTATION* ; Summary; Introduction; Federal Critical Infrastructure Protection Policy: In Brief; The President's Commission on Critical Infrastructure Protection; Presidential Decision Directive No. 63; Restructuring by the Bush Administration; Pre-September 11; Post-September 11 Executive OrdersNational Strategy for Homeland Security; HSPD-7; The Obama Administration; Initial Efforts; Cybersecurity Legislation and Executive Orders; PPD-21; Department of Homeland Security; Initial Establishment; Second Stage Review Reorganization; Post-Katrina Emergency Management Reform Act of 2006; Continued Organizational Evolution; Policy Implementation; Government-Sector Coordination; National Critical Infrastructure Plan; Information Sharing and Analysis Center (ISAC); Identifying Critical Assets, Assessing Vulnerability and Risk, and Prioritizing Protective Measures Cybersecurity FrameworkIssues and Discussion; Information Sharing; Regulation; Appendix. Funding for Critical Infrastructure; Federal Funding for Critical Infrastructure Protection; FY2016 DHS Budget Request and Prior Year Appropriations for Infrastructure Protection and Information Security Program and Other Relevant DHS Budget Activities; IPIS; Other Infrastructure Related Programs; End Notes; Chapter 2 THE 2013 CYBERSECURITY EXECUTIVE ORDER: OVERVIEW AND CONSIDERATIONS FOR CONGRESS ; Summary; Background: Threats and Consequences; Cyberthreats; Cyberterrorists; Cyberspies; Cyberthieves CyberwarriorsCyberhacktivists; Cyberthreats and Implications for U.S. Policy; Overview of the Executive Order; Information Sharing; Voluntary Cybersecurity Framework; Other Provisions; E.O. 13636 Implementation Deliverables and Deadlines; June 12, 2013; July 12, 2013; October 10, 2013; February 12, 2014; May 13, 2014; February 12, 2016; Relationship of the Executive Order to Presidential Policy Directive 21; PPD 21 Implementation Deliverables and Deadlines; June 12, 2013; July 12, 2013; August 11, 2013; October 10, 2013; February 12, 2015; Scope of Presidential Authority Relationship to Legislative ProposalsReactions to the Executive Order; End Notes; Chapter 3 CYBERSECURITY ISSUES FOR THE BULK POWER SYSTEM* ; Summary; Introduction; Grid Components and Potential Vulnerabilities; Electric Utility Industrial Control Systems; Supervisory Control and Data Acquisition Systems; Distributed Control Systems; Modernization and the Smart Grid; Other Potential Vulnerabilities; Distributed Generation; Smart Meters; Supply Chains; The Grid Is Experiencing Cyber Intrusions; BlackEnergy; HAVEX; Sandworm; Mandatory Bulk Power Cybersecurity Standards Cyberterrorism United States Prevention. BUSINESS & ECONOMICS Infrastructure. bisacsh SOCIAL SCIENCE General. bisacsh Computer networks Security measures Government policy fast Cyberterrorism Prevention fast United States fast https://id.oclc.org/worldcat/entity/E39PBJtxgQXMWqmjMjjwXRHgrq Yates, Sheldon, editor. Print version: National critical infrastructure policy. New York : Nova Publishers, [2016] 1634847563 (DLC) 2016302276 Defense, security and strategy series. http://id.loc.gov/authorities/names/no2010078560 FWS01 ZDB-4-EBU FWS_PDA_EBU https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1226205 Volltext |
spellingShingle | National critical infrastructure policy : background and select cybersecurity issues / Defense, security and strategy series. NATIONAL CRITICAL INFRASTRUCTURE POLICY BACKGROUND AND SELECT CYBERSECURITY ISSUES ; NATIONAL CRITICAL INFRASTRUCTURE POLICY BACKGROUND AND SELECT CYBERSECURITY ISSUES ; Library of Congress Cataloging-in-Publication Data; CONTENTS ; PREFACE ; Chapter 1 CRITICAL INFRASTRUCTURES: BACKGROUND, POLICY, AND IMPLEMENTATION* ; Summary; Introduction; Federal Critical Infrastructure Protection Policy: In Brief; The President's Commission on Critical Infrastructure Protection; Presidential Decision Directive No. 63; Restructuring by the Bush Administration; Pre-September 11; Post-September 11 Executive OrdersNational Strategy for Homeland Security; HSPD-7; The Obama Administration; Initial Efforts; Cybersecurity Legislation and Executive Orders; PPD-21; Department of Homeland Security; Initial Establishment; Second Stage Review Reorganization; Post-Katrina Emergency Management Reform Act of 2006; Continued Organizational Evolution; Policy Implementation; Government-Sector Coordination; National Critical Infrastructure Plan; Information Sharing and Analysis Center (ISAC); Identifying Critical Assets, Assessing Vulnerability and Risk, and Prioritizing Protective Measures Cybersecurity FrameworkIssues and Discussion; Information Sharing; Regulation; Appendix. Funding for Critical Infrastructure; Federal Funding for Critical Infrastructure Protection; FY2016 DHS Budget Request and Prior Year Appropriations for Infrastructure Protection and Information Security Program and Other Relevant DHS Budget Activities; IPIS; Other Infrastructure Related Programs; End Notes; Chapter 2 THE 2013 CYBERSECURITY EXECUTIVE ORDER: OVERVIEW AND CONSIDERATIONS FOR CONGRESS ; Summary; Background: Threats and Consequences; Cyberthreats; Cyberterrorists; Cyberspies; Cyberthieves CyberwarriorsCyberhacktivists; Cyberthreats and Implications for U.S. Policy; Overview of the Executive Order; Information Sharing; Voluntary Cybersecurity Framework; Other Provisions; E.O. 13636 Implementation Deliverables and Deadlines; June 12, 2013; July 12, 2013; October 10, 2013; February 12, 2014; May 13, 2014; February 12, 2016; Relationship of the Executive Order to Presidential Policy Directive 21; PPD 21 Implementation Deliverables and Deadlines; June 12, 2013; July 12, 2013; August 11, 2013; October 10, 2013; February 12, 2015; Scope of Presidential Authority Relationship to Legislative ProposalsReactions to the Executive Order; End Notes; Chapter 3 CYBERSECURITY ISSUES FOR THE BULK POWER SYSTEM* ; Summary; Introduction; Grid Components and Potential Vulnerabilities; Electric Utility Industrial Control Systems; Supervisory Control and Data Acquisition Systems; Distributed Control Systems; Modernization and the Smart Grid; Other Potential Vulnerabilities; Distributed Generation; Smart Meters; Supply Chains; The Grid Is Experiencing Cyber Intrusions; BlackEnergy; HAVEX; Sandworm; Mandatory Bulk Power Cybersecurity Standards Cyberterrorism United States Prevention. BUSINESS & ECONOMICS Infrastructure. bisacsh SOCIAL SCIENCE General. bisacsh Computer networks Security measures Government policy fast Cyberterrorism Prevention fast |
title | National critical infrastructure policy : background and select cybersecurity issues / |
title_auth | National critical infrastructure policy : background and select cybersecurity issues / |
title_exact_search | National critical infrastructure policy : background and select cybersecurity issues / |
title_full | National critical infrastructure policy : background and select cybersecurity issues / Sheldon Yates, editor. |
title_fullStr | National critical infrastructure policy : background and select cybersecurity issues / Sheldon Yates, editor. |
title_full_unstemmed | National critical infrastructure policy : background and select cybersecurity issues / Sheldon Yates, editor. |
title_short | National critical infrastructure policy : |
title_sort | national critical infrastructure policy background and select cybersecurity issues |
title_sub | background and select cybersecurity issues / |
topic | Cyberterrorism United States Prevention. BUSINESS & ECONOMICS Infrastructure. bisacsh SOCIAL SCIENCE General. bisacsh Computer networks Security measures Government policy fast Cyberterrorism Prevention fast |
topic_facet | Cyberterrorism United States Prevention. BUSINESS & ECONOMICS Infrastructure. SOCIAL SCIENCE General. Computer networks Security measures Government policy Cyberterrorism Prevention United States |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1226205 |
work_keys_str_mv | AT yatessheldon nationalcriticalinfrastructurepolicybackgroundandselectcybersecurityissues |