did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781394179527

Critical Infrastructure Resilience and Sustainability Reader

by
  • ISBN13:

    9781394179527

  • ISBN10:

    1394179529

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2023-10-10
  • Publisher: Wiley

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $80.00 Save up to $21.20
  • Rent Book $58.80
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    USUALLY SHIPS IN 3-4 BUSINESS DAYS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

Identify and protect critical infrastructure from a wide variety of threats

In Critical Infrastructure Resilience and Sustainability Reader, Ted G. Lewis delivers a clear and compelling discussion of what infrastructure requires protection, how to protect it, and the consequences of failure. Through the book, you’ll examine the intersection of cybersecurity, climate change, and sustainability as you reconsider and reexamine the resilience of your infrastructure systems.

The author walks you through how to conduct accurate risk assessments, make sound investment decisions, and justify your actions to senior executives. You’ll learn how to protect water supplies, energy pipelines, telecommunication stations, power grids, and a wide variety of computer networks, without getting into the weeds of highly technical mathematical models.

Critical Infrastructure Resilience and Sustainability Reader also includes:

  • A thorough introduction to the daunting challenges facing infrastructure and the professionals tasked with protecting it
  • Comprehensive explorations of the proliferation of cyber threats, terrorism in the global West, climate change, and financial market volatility
  • Practical discussions of a variety of infrastructure sectors, including how they work, how they’re regulated, and the threats they face
  • Clear graphics, narrative guides, and a conversational style that makes the material easily accessible to non-technical readers

Perfect for infrastructure security professionals and security engineering firms, Critical Infrastructure Resilience and Sustainability Reader will also benefit corporate security managers and directors, government actors and regulators, and policing agencies, emergency services, and first responders.

Author Biography

Ted G. Lewis is an author, speaker, and computer scientist with expertise in applied complexity theory, homeland security, infrastructure systems, and early-stage startup strategies. He is a member of the Oregon State University Engineering Hall of Fame and has held high-ranking positions in government, industry, and academia over his lengthy career.

Table of Contents

Preface

THE CHALLENGE               2

1.  The Evolution of Critical Infrastructure Protection       3

1.1. In the Beginning       4

1.2. Natural Disaster Recovery   7

1.3. What is Critical?        11

1.4. Public-private Cooperation 15

1.5. Federalism: Whole of government  17

2.  Defining CIKR Risk and Resilience        20

2.1. Risk Strategy             23

2.2. Resilience Strategy 25

2.3. Sustainability Strategy           28

2.4. The Four Horsemen 31

3. Weather/Climate Change/Global Warming      32

3.1. The Carrington Event             34

3.2. Black Bodies              36

3.3. The Lightening Rod 38

4. Consequences             39

4.1. Accidents/Aging/Neglect     40

4.2.  The Report Card      42

4.2.1.  The Domino Effect             42

4.3. Terrorism/Extremists            43

4.4. Cyber Exploits/Criminals       47

4.4.1. Black Hats               48

4.4.2. Cybercrime Pays  49

4.5. The Soft War              51

4.6. Cyberattacks and CIKR           53

5. Discussion      55

 

WHAT IS A CATASTROPHE?          2

1. Theories of Collapse   4

1.1. Normal Accident Theory (NAT)          5

1.2. Punctuated Equilibrium Theory (PET)              7

1.3. How Uncertain are Avalanches?        8

2.4. Self-organized Criticality       10

2. Complex Systems Theory        12

2.1 Tragedy of the Commons (TOC)          13

2.2. Paradox of Enrichment (POE)             17

2.3. Competitive Exclusion Principle (CEP)             21

2.4. Paradox of Redundancy (POR)           25

3. General Systems Theory          27

3.1. Emergence 27

3.2. Self-Organization    28

3.3. Preferential Attachment      29

4. Vulnerable Industrial Commons            30

4.1. TOC Failure 32

4.2. POE Failure 32

4.3. CEP Failure 33

4.4. POR Failure 34

5. Resilience vs. Sustainability     34

5.1. Black Swans               35

5.2. Catastrophe’s Long Tail         36

6. Discussion      37

 

ENERGY TRANSITION      2

1. A Sector Under Transition        2

2.1. Understanding Units and Measures 6

2.2. Consumption            7

3. Regulatory Structure of the Energy Sector        9

3.1. Evolution of Energy Sector Regulation            9

3.2. Energy Pipeline Regulations 10

3.3. The Energy ISAC       12

4. Legacy Fuels  13

4.1. Coal               13

4.2. The Rise of Oil and the Automobile 14

4.3. Natural Gas Middlemen       16

4.4. Nuclear Fuel              18

5. Legacy Energy Infrastructure  21

5.1. Oil Refineries            22

5.2. Oil Transmission and Distribution     24

5.3. Oil Storage 25

5.4. The Natural Gas Supply Chain             28

5.1. Critical Refineries    30

5.2. Critical Transmission Pipelines           31

6. Renewables  33

6.1. Solar – Photovoltaic (PV)      33

6.2. Wind             34

6.3. The Hydrogen Circle               36

6.4. Others         39

7. Batteries and Reservoirs          40

7.1. Modern Batteries    41

7.2. Grid Scale Storage – LDES     42

8. Discussion      43

 

THE VULNERABLE POWERGRID  1

1. What is the Grid?        5

2. The North American Grid         8

2.1. Grid Structure           10

2.2. ACE and Kirchhoff’s Law       13

2.3. Anatomy of a Blackout          14

3. Threat Analysis             19

3.1. Attack Scenario 1:  Disruption of fuel supply to power plants                19

3.2. Attack Scenario 2:  Destruction of major transformers            20

3.3. Attack Scenario 3:  Disruption of SCADA communications      23

3.4 Attack Scenario 4:  Creation of a cascading transmission failure            24

4. From Death Rays to Vertical Integration            26

4.1. Early Regulation       29

4.2. Deregulation and EPACT 1992             32

4.3. Energy Sector ISAC 34

5. Out of Orders 888 and 889 Comes Chaos          37

5.1. Economics Versus Physics    41

5.2. What Increases SOC?             44

5.3. A Change of Heart   48

6. The Architecture of 21st Century Grids              49

6.1.  The Future is Storage            51

6.2. SOC is Reduced        54

6.3.  Economics of Electrification               57

7. Discussion      60

 

WATER AND WATER TREATMENT              2

1. A Vanishing Resource 2

1.1. From Germs to Terrorists     5

1.2. Safe Drinking Water Act        6

1.3. The WaterISAC         8

2.  Foundations: SDWA of 1974   9

3. The Bio-terrorism Act of 2002 11

3.1. Is Water for Drinking?            12

3.2. Climate Change and Rot – the New Threats  15

4. The Architecture of Water Systems     18

4.1. The Law of the River               20

4.2. Resiliency of Water Pipeline Networks           21

5. Hetch Hetchy Water  23

5.1. Risk Analysis              26

5.2. Resilience Analysis  26

6. Threat Analysis             27

6.1. The Rational Actor  28

6.2. Hetch Hetchy Threat Analysis             29

6.3. Chem-Bio   30

6.4. Earthquakes              32

7. Water Resilience         33

7.1. Save the Pineapple Express 34

7.2. Grey Water 36

7.3. Desalination              37

7.4. Exemplar Israel         38

8. Discussion      39

 

TRANSPORTATION RENEWED     2

1. Transitioning a Vast and Complex Sector           2

1.1.   Government Leads the Way             4

1.2. Safety and Security 5

2. Roads at TOC Risk        8

2.1. The Road to Prosperity         13

2.2. Economic Impact     14

2.3. The National Highway System (NHS)               16

2.4. The Interstate Highway Network is Resilient 18

2.5. The NHS is Safer       19

2.6. The Future is Electric              21

3. Rail and Railroads        22

3.1. Birth of Regulation  25

3.2. Freight Trains            29

3.3. Passenger Rail           30

3.4. Terrorist Target Passenger Trains     32

3.5. Economics of Rail     34

4. Air Transportation      36

4.1. Resilience of the Hub-and-Spoke Network   41

4.2. Security of Commercial Air Travel     43

4.3. How Safe and Secure is Flying in the US?       47

4.4. Drones         48

4.5. eVTOLs        49

4.6. Commercial Airline Impact on Global Warming           49

5. Discussion      50

 

SUPPLY CHAINS 1

1. The World Is Flat, But Tilted    7

1.1. Supply Side Supply  10

1.2. The Father of Containerization          11

1.3. The Perils of Efficient Supply Chains 13

2. The World Trade Web               18

2.1. WTW and Economic Contagions        19

2.2. Resilience Failures   21

3. TWIC 25

3.1. MSRAM       26

3.2. PROTECT     30

4. Sustainable and Resilient Supply Chains             31

5. Are Supply Chains Secure?      33

5.1. Encapsulation Works             35

5.2. Who Owns the Trusted Path?             36

6. Discussion      37

 

COMMUNICATIONS AND THE INTERNET 2

1. Early Years     5

1.1. The Natural Monopoly          9

1.2. The Communications Act of 1996      12

2. Regulatory Structure 14

2.1. The Most Important Person in Modern History           15

2.2. The First (Modern) Critical Infrastructure      16

3. The Architecture of the Communications Sector            21

3.1. Physical Infrastructure          21

3.2. Wireless Networks 24

3.3. Extra-terrestrial Communication       26

3.4. Land Earth Stations 30

3.5. Cellular Networks   31

3.6. Cell Phone Generations        34

3.7. Wi-Fi Technology     35

4. Risk and Resilience Analysis    37

4.1. Importance of Carrier Hotels              39

4.2. The Submarine Cable Network          41

4.3. HPM Threats             43

4.4. Cellular Network Threats     45

4.5. Physical Threats       49

5. The Monoculture Internet      49

5.1. The Internet Self-organized 52

5.2. The Original Sins      55

5.2.1. The DNS   58

5.2.2. More Original Sin 60

5.3. The Hierarchical Internet     62

5.4. Too Many Open Ports            65

6. Internet Governance 66

6.1. IAB and IETF               67

6.2. ICANN Wars               71

6.3. ISOC              74

6.4. W3C              75

6.5. Internationalization 77

6.6. Regulation and Balkanization              79

6.6.1. Rise of Regulation                81

6.6.2. Criticality of the Internet  83

7.  Green Communications          84

7.1. Solar Computing      84

7.2. Quantum Communications 85

7.3. Adiabatic Logic          86

8. Discussion      87

 

CYBER THREATS 1

1. Threat surface              8

1.1. Script-kiddies            14

1.2. Black Hats   16

1.3. Weaponized Exploits             16

1.4. Ransomware and the NSA   19

2. Basic Vulnerabilities   22

2.1. The First Exploit       25

2.2. TCP/IP Flaws              29

2.3. Open Ports 33

2.4. Buffer Overflow Exploits      35

2.5. DDoS Attacks            37

2.6. Email Exploits            38

2.7. Flawed Application and System Software     39

2.8. Trojans, Worms, Viruses, and Keyloggers      42

2.9. Hacking the DNS      44

2.10. Hardware Flaws     46

2.11. Botnets     49

3. Cyber Risk Analysis     52

3.1. Kill Chain Approach 53

3.2. Machine-learning Approach 55

4. Analysis           57

5. Discussion      59

 

SOCIAL HACKING             1

1. Web 2.0 and the Social Network          5

2. Social Networks Amplify Memes          10

3. Topology Matters       13

4. Computational Propaganda    15

5. Beware the Echo Chamber      18

6. Big Data Analytics        20

6.1. Algorithmic Bias       23

6.2. The Depths of Deep Learning             24

6.3. Data Brokers             25

7. GDPR               26

8. Social Network Resilience        30

9. The Sustainable Web 32

9.1. The Century of Regulation   33

9.2. The NetzDG               34

10. Discussion    37

 

BANKING AND FINANCE 2

1. The Financial System 10

1.1. Federal Reserve vs. US Treasury        12

1.2. Operating the System            13

1.3. Balancing the Balance Sheet               15

1.4. Paradox of Enrichment          18

2. Financial Networks     19

2.1. FedWire      20

2.2. TARGET       22

2.3. SWIFT           24

2.4. Credit Card Networks            26

2.5. 3-D Secure Payment              27

3. Virtual Currency          29

3.1. Intermediary PayPal               30

3.2. ApplePay    31

3.3. Cryptocurrency        32

3.3.1. Nakamoto’s Revenge         34

3.3.2. Double Spend Problem     35

3.3.3. Crypto Challenges               39

4. Hacking a Financial Network  43

5. Hot Money    45

5.1. Liquidity Traps          46

5.2. The Dutch Disease  49

6. The End of Stimulus? 51

7. Fractal Markets            52

7.1. Efficient Market Hypothesis (EMH)  53

7.2. Fractal Market Hypothesis (FMH)     55

7.3. Predicting Collapse 56

8. The Threat is Existential            58

9. Discussion      59

 

STRATEGIES FOR A CHANGING WORLD   1

1. Whole of Government              5

2. Risk and Resilience     8

3. Complex and Emergent CIKR  12

3.1. Communications and IT         13

3.2. Internet and Cybersecurity 15

4. Surveillance Capitalism             17

5. Industrial Control Systems      19

6. Global Pandemics       22

7. Transportation and Supply Chains        23

8. Banking and Finance  25

9. Discussion      27

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program