did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780470286296

Transportation Infrastructure Security Utilizing Intelligent Transportation Systems

by ; ;
  • ISBN13:

    9780470286296

  • ISBN10:

    0470286296

  • Format: Hardcover
  • Copyright: 2008-11-10
  • Publisher: Wiley

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

List Price: $156.00 Save up to $57.72
  • Rent Book $98.28
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-4 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

When integrated into the transportation system infrastructure, and in vehicles themselves, Intelligent Transportation Systems, or ITS, help monitor and manage traffic flow, reduce congestion, provide alternate routes to travelers, enhance productivity, and save lives, time, and money. Here is the first comprehensive treatment of techniques to leverage ITS in support of security and safety for surface transportation infrastructure. Case studies of current ITS approaches to security issues such as freight security, disaster and evacuation response, HAZMAT incidents, rail security, and ITS Wide Area Alerts show the reader how to design, model, and implement a variety of projects.

Author Biography

Ryan Fries is an Assistant Professor in the Department of Civil Engineering at Southern Illinois University Edwardsville, Edwardsville, Illinois. MASHRUR CHOWDHURY is an Associate Professor in the Department of Civil Engineering at Clemson University, Clemson, South Carolina. JEFFREY BRUMMOND is Principal Systems Architect at Iteris.

Table of Contents

Prefacep. xiii
Acknowledgmentsp. xvii
Introductionp. 1
Concept of Securityp. 1
Transportation and Securityp. 4
Security in the ITS Contextp. 6
Scope and Audience of the Bookp. 10
Content and Organizationp. 11
Referencesp. 12
Review Questionsp. 13
Need for Surface Transportation Infrastructure Securityp. 14
Vulnerabilitiesp. 14
Common Characteristics of Surface Transportation Systemsp. 16
Common Threats to Surface Transportation Systemsp. 17
Earthquakesp. 17
Firesp. 18
Terrorist Attacksp. 18
HAZMATp. 19
Blackoutsp. 20
Hurricanesp. 20
Floodsp. 21
Biological and Chemical Attacksp. 22
Derailmentp. 23
Cyber Attacksp. 23
Defending against Threats Both External and Internalp. 24
Why Transportation Infrastructure Security Is Importantp. 26
Focus Areasp. 27
Summaryp. 28
Referencesp. 28
Review Questionsp. 30
Leveraging its to Reduce Risk and Exposure Using its Security Areasp. 31
Introductionp. 31
Disaster Response and Evacuationp. 35
Freight and Commercial Vehicle Securityp. 40
HAZMAT Securityp. 44
ITS Wide Area Alertp. 47
Rail Securityp. 49
Transit Securityp. 50
Transportation Infrastructure Securityp. 54
Traveler Securityp. 57
Conclusionsp. 58
Referencesp. 59
Review Questionsp. 59
Risk Assessment Frameworkp. 60
Risk Assessment Frameworkp. 61
Critical Assetsp. 64
Risks Assessment Methodsp. 64
Mitigation and Countermeasuresp. 70
Selection of Optionsp. 71
Opportunities and Challengesp. 72
Application of the Frameworkp. 72
Referencesp. 72
Review Questionsp. 73
Application of Risk Assessment and Management Toolsp. 74
Application of Risk Assessment Methodsp. 74
Blue Ribbon Panel Methodp. 74
Fault-Tree Analysisp. 84
Weibull Hazards Model Examplep. 93
Application of Evacuation Models and Traffic Models for Response Planningp. 94
Application of Other Methodsp. 99
Referencesp. 99
Review Questionsp. 100
Fundamentals of Computer Network Security for Itsp. 102
Introductionp. 102
Elements of Computer Network Securityp. 103
Importance of Computer Network Securityp. 104
Approach to Computer Network Securityp. 104
Policyp. 105
Current Statep. 106
Security Requirementsp. 106
Recommended Controlsp. 106
Accountabilityp. 107
Timetablep. 107
Continuing Attentionp. 108
Computer Network Security in ITSp. 108
Network Security Objectivesp. 108
Confidentialityp. 109
Authenticationp. 112
Message Integrity and Nonrepudiationp. 113
Availabilityp. 114
Access Controlp. 116
Future of Network Security and Its Impacts on Securing ITS Networkp. 117
Referencesp. 117
Review Questionsp. 118
Securing Itsp. 120
Introductionp. 120
Security Objectivesp. 123
Confidentalityp. 123
Integrityp. 123
Availabilityp. 123
Security Threatsp. 124
Deceptionp. 124
Disruptionp. 124
Usurpationp. 124
(Unauthorized) Disclosurep. 124
Security Servicesp. 125
Information Securityp. 125
ITS Personnel Securityp. 125
Operational Securityp. 126
Security Managementp. 126
Securing ITS Subsystemsp. 127
Securing Communications between Subsystemsp. 128
Security and ITS Standardsp. 133
National Transportation Communications for ITS Protocolp. 133
Traffic Management Data Dictionary and Message Setsp. 137
Commercial Vehicle Information Systems and Networksp. 137
Archived Datap. 139
Dedicated Short Range Communicationsp. 139
Incident Managementp. 140
Transit Communications Interface Profilesp. 140
Advanced Traveler Information Systemsp. 142
Conclusionsp. 143
Referencesp. 143
Review Questionsp. 144
Its Security Areas and Multimodal Transportation Securityp. 146
Protecting Peoplep. 146
Airportsp. 146
Public Transitp. 149
Perception of Securityp. 153
Protecting Vehicles and Infrastructurep. 154
Airportsp. 154
Public Transitp. 156
Rail Vehicles and Infrastructurep. 159
Ships and Portsp. 160
Protecting Freightp. 162
Containersp. 162
HAZMATp. 164
Liquidsp. 165
Military Freightp. 165
The Futurep. 166
Referencesp. 167
Review Questionsp. 169
Process for Developing a Regional Transportation Security Planp. 171
Introductionp. 171
Developing a Regional Transportation Security Architecturep. 173
Security in a Regional ITS Architecture Development Processp. 174
Developing a Regional Transportation Security Architecturep. 181
Developing a Project Security Planp. 183
Conclusionp. 186
Referencesp. 186
Review Questionsp. 187
Issues and Opportunites for Transportation Infrastructure Securityp. 188
ITS Security versus Privacyp. 188
Public and Private Rolesp. 189
Stakeholder Cooperation and Coordination Requirementsp. 192
Information Sharingp. 193
Resource Sharing Agreementsp. 194
Funding Sources and Constraintsp. 195
Human Resourcesp. 195
Future Directions and Opportunitiesp. 196
Referencesp. 197
Review Questionsp. 198
National Its Architecture Subsystem Security Descriptionsp. 199
Securing Architecture Flowsp. 211
Usdot Fhwa Final Rulep. 237
Usdot Fta Policy on Transit Projectsp. 261
Weibull Distribution Supportp. 274
Indexp. 277
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program