We're sorry, but eCampus.com doesn't work properly without JavaScript.
Either your device does not support JavaScript or you do not have JavaScript enabled.
How to enable JavaScript in your browser.
Need help? Call 1-855-252-4222
Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
What is included with this book?
Identify and protect critical infrastructure from a wide variety of threats
In Critical Infrastructure Resilience and Sustainability Reader, Ted G. Lewis delivers a clear and compelling discussion of what infrastructure requires protection, how to protect it, and the consequences of failure. Through the book, you’ll examine the intersection of cybersecurity, climate change, and sustainability as you reconsider and reexamine the resilience of your infrastructure systems.
The author walks you through how to conduct accurate risk assessments, make sound investment decisions, and justify your actions to senior executives. You’ll learn how to protect water supplies, energy pipelines, telecommunication stations, power grids, and a wide variety of computer networks, without getting into the weeds of highly technical mathematical models.
Critical Infrastructure Resilience and Sustainability Reader also includes:
Perfect for infrastructure security professionals and security engineering firms, Critical Infrastructure Resilience and Sustainability Reader will also benefit corporate security managers and directors, government actors and regulators, and policing agencies, emergency services, and first responders.
Ted G. Lewis is an author, speaker, and computer scientist with expertise in applied complexity theory, homeland security, infrastructure systems, and early-stage startup strategies. He is a member of the Oregon State University Engineering Hall of Fame and has held high-ranking positions in government, industry, and academia over his lengthy career.
Preface
THE CHALLENGE 2
1. The Evolution of Critical Infrastructure Protection 3
1.1. In the Beginning 4
1.2. Natural Disaster Recovery 7
1.3. What is Critical? 11
1.4. Public-private Cooperation 15
1.5. Federalism: Whole of government 17
2. Defining CIKR Risk and Resilience 20
2.1. Risk Strategy 23
2.2. Resilience Strategy 25
2.3. Sustainability Strategy 28
2.4. The Four Horsemen 31
3. Weather/Climate Change/Global Warming 32
3.1. The Carrington Event 34
3.2. Black Bodies 36
3.3. The Lightening Rod 38
4. Consequences 39
4.1. Accidents/Aging/Neglect 40
4.2. The Report Card 42
4.2.1. The Domino Effect 42
4.3. Terrorism/Extremists 43
4.4. Cyber Exploits/Criminals 47
4.4.1. Black Hats 48
4.4.2. Cybercrime Pays 49
4.5. The Soft War 51
4.6. Cyberattacks and CIKR 53
5. Discussion 55
WHAT IS A CATASTROPHE? 2
1. Theories of Collapse 4
1.1. Normal Accident Theory (NAT) 5
1.2. Punctuated Equilibrium Theory (PET) 7
1.3. How Uncertain are Avalanches? 8
2.4. Self-organized Criticality 10
2. Complex Systems Theory 12
2.1 Tragedy of the Commons (TOC) 13
2.2. Paradox of Enrichment (POE) 17
2.3. Competitive Exclusion Principle (CEP) 21
2.4. Paradox of Redundancy (POR) 25
3. General Systems Theory 27
3.1. Emergence 27
3.2. Self-Organization 28
3.3. Preferential Attachment 29
4. Vulnerable Industrial Commons 30
4.1. TOC Failure 32
4.2. POE Failure 32
4.3. CEP Failure 33
4.4. POR Failure 34
5. Resilience vs. Sustainability 34
5.1. Black Swans 35
5.2. Catastrophe’s Long Tail 36
6. Discussion 37
ENERGY TRANSITION 2
1. A Sector Under Transition 2
2.1. Understanding Units and Measures 6
2.2. Consumption 7
3. Regulatory Structure of the Energy Sector 9
3.1. Evolution of Energy Sector Regulation 9
3.2. Energy Pipeline Regulations 10
3.3. The Energy ISAC 12
4. Legacy Fuels 13
4.1. Coal 13
4.2. The Rise of Oil and the Automobile 14
4.3. Natural Gas Middlemen 16
4.4. Nuclear Fuel 18
5. Legacy Energy Infrastructure 21
5.1. Oil Refineries 22
5.2. Oil Transmission and Distribution 24
5.3. Oil Storage 25
5.4. The Natural Gas Supply Chain 28
5.1. Critical Refineries 30
5.2. Critical Transmission Pipelines 31
6. Renewables 33
6.1. Solar – Photovoltaic (PV) 33
6.2. Wind 34
6.3. The Hydrogen Circle 36
6.4. Others 39
7. Batteries and Reservoirs 40
7.1. Modern Batteries 41
7.2. Grid Scale Storage – LDES 42
8. Discussion 43
THE VULNERABLE POWERGRID 1
1. What is the Grid? 5
2. The North American Grid 8
2.1. Grid Structure 10
2.2. ACE and Kirchhoff’s Law 13
2.3. Anatomy of a Blackout 14
3. Threat Analysis 19
3.1. Attack Scenario 1: Disruption of fuel supply to power plants 19
3.2. Attack Scenario 2: Destruction of major transformers 20
3.3. Attack Scenario 3: Disruption of SCADA communications 23
3.4 Attack Scenario 4: Creation of a cascading transmission failure 24
4. From Death Rays to Vertical Integration 26
4.1. Early Regulation 29
4.2. Deregulation and EPACT 1992 32
4.3. Energy Sector ISAC 34
5. Out of Orders 888 and 889 Comes Chaos 37
5.1. Economics Versus Physics 41
5.2. What Increases SOC? 44
5.3. A Change of Heart 48
6. The Architecture of 21st Century Grids 49
6.1. The Future is Storage 51
6.2. SOC is Reduced 54
6.3. Economics of Electrification 57
7. Discussion 60
WATER AND WATER TREATMENT 2
1. A Vanishing Resource 2
1.1. From Germs to Terrorists 5
1.2. Safe Drinking Water Act 6
1.3. The WaterISAC 8
2. Foundations: SDWA of 1974 9
3. The Bio-terrorism Act of 2002 11
3.1. Is Water for Drinking? 12
3.2. Climate Change and Rot – the New Threats 15
4. The Architecture of Water Systems 18
4.1. The Law of the River 20
4.2. Resiliency of Water Pipeline Networks 21
5. Hetch Hetchy Water 23
5.1. Risk Analysis 26
5.2. Resilience Analysis 26
6. Threat Analysis 27
6.1. The Rational Actor 28
6.2. Hetch Hetchy Threat Analysis 29
6.3. Chem-Bio 30
6.4. Earthquakes 32
7. Water Resilience 33
7.1. Save the Pineapple Express 34
7.2. Grey Water 36
7.3. Desalination 37
7.4. Exemplar Israel 38
8. Discussion 39
TRANSPORTATION RENEWED 2
1. Transitioning a Vast and Complex Sector 2
1.1. Government Leads the Way 4
1.2. Safety and Security 5
2. Roads at TOC Risk 8
2.1. The Road to Prosperity 13
2.2. Economic Impact 14
2.3. The National Highway System (NHS) 16
2.4. The Interstate Highway Network is Resilient 18
2.5. The NHS is Safer 19
2.6. The Future is Electric 21
3. Rail and Railroads 22
3.1. Birth of Regulation 25
3.2. Freight Trains 29
3.3. Passenger Rail 30
3.4. Terrorist Target Passenger Trains 32
3.5. Economics of Rail 34
4. Air Transportation 36
4.1. Resilience of the Hub-and-Spoke Network 41
4.2. Security of Commercial Air Travel 43
4.3. How Safe and Secure is Flying in the US? 47
4.4. Drones 48
4.5. eVTOLs 49
4.6. Commercial Airline Impact on Global Warming 49
5. Discussion 50
SUPPLY CHAINS 1
1. The World Is Flat, But Tilted 7
1.1. Supply Side Supply 10
1.2. The Father of Containerization 11
1.3. The Perils of Efficient Supply Chains 13
2. The World Trade Web 18
2.1. WTW and Economic Contagions 19
2.2. Resilience Failures 21
3. TWIC 25
3.1. MSRAM 26
3.2. PROTECT 30
4. Sustainable and Resilient Supply Chains 31
5. Are Supply Chains Secure? 33
5.1. Encapsulation Works 35
5.2. Who Owns the Trusted Path? 36
COMMUNICATIONS AND THE INTERNET 2
1. Early Years 5
1.1. The Natural Monopoly 9
1.2. The Communications Act of 1996 12
2. Regulatory Structure 14
2.1. The Most Important Person in Modern History 15
2.2. The First (Modern) Critical Infrastructure 16
3. The Architecture of the Communications Sector 21
3.1. Physical Infrastructure 21
3.2. Wireless Networks 24
3.3. Extra-terrestrial Communication 26
3.4. Land Earth Stations 30
3.5. Cellular Networks 31
3.6. Cell Phone Generations 34
3.7. Wi-Fi Technology 35
4. Risk and Resilience Analysis 37
4.1. Importance of Carrier Hotels 39
4.2. The Submarine Cable Network 41
4.3. HPM Threats 43
4.4. Cellular Network Threats 45
4.5. Physical Threats 49
5. The Monoculture Internet 49
5.1. The Internet Self-organized 52
5.2. The Original Sins 55
5.2.1. The DNS 58
5.2.2. More Original Sin 60
5.3. The Hierarchical Internet 62
5.4. Too Many Open Ports 65
6. Internet Governance 66
6.1. IAB and IETF 67
6.2. ICANN Wars 71
6.3. ISOC 74
6.4. W3C 75
6.5. Internationalization 77
6.6. Regulation and Balkanization 79
6.6.1. Rise of Regulation 81
6.6.2. Criticality of the Internet 83
7. Green Communications 84
7.1. Solar Computing 84
7.2. Quantum Communications 85
7.3. Adiabatic Logic 86
8. Discussion 87
CYBER THREATS 1
1. Threat surface 8
1.1. Script-kiddies 14
1.2. Black Hats 16
1.3. Weaponized Exploits 16
1.4. Ransomware and the NSA 19
2. Basic Vulnerabilities 22
2.1. The First Exploit 25
2.2. TCP/IP Flaws 29
2.3. Open Ports 33
2.4. Buffer Overflow Exploits 35
2.5. DDoS Attacks 37
2.6. Email Exploits 38
2.7. Flawed Application and System Software 39
2.8. Trojans, Worms, Viruses, and Keyloggers 42
2.9. Hacking the DNS 44
2.10. Hardware Flaws 46
2.11. Botnets 49
3. Cyber Risk Analysis 52
3.1. Kill Chain Approach 53
3.2. Machine-learning Approach 55
4. Analysis 57
5. Discussion 59
SOCIAL HACKING 1
1. Web 2.0 and the Social Network 5
2. Social Networks Amplify Memes 10
3. Topology Matters 13
4. Computational Propaganda 15
5. Beware the Echo Chamber 18
6. Big Data Analytics 20
6.1. Algorithmic Bias 23
6.2. The Depths of Deep Learning 24
6.3. Data Brokers 25
7. GDPR 26
8. Social Network Resilience 30
9. The Sustainable Web 32
9.1. The Century of Regulation 33
9.2. The NetzDG 34
10. Discussion 37
BANKING AND FINANCE 2
1. The Financial System 10
1.1. Federal Reserve vs. US Treasury 12
1.2. Operating the System 13
1.3. Balancing the Balance Sheet 15
1.4. Paradox of Enrichment 18
2. Financial Networks 19
2.1. FedWire 20
2.2. TARGET 22
2.3. SWIFT 24
2.4. Credit Card Networks 26
2.5. 3-D Secure Payment 27
3. Virtual Currency 29
3.1. Intermediary PayPal 30
3.2. ApplePay 31
3.3. Cryptocurrency 32
3.3.1. Nakamoto’s Revenge 34
3.3.2. Double Spend Problem 35
3.3.3. Crypto Challenges 39
4. Hacking a Financial Network 43
5. Hot Money 45
5.1. Liquidity Traps 46
5.2. The Dutch Disease 49
6. The End of Stimulus? 51
7. Fractal Markets 52
7.1. Efficient Market Hypothesis (EMH) 53
7.2. Fractal Market Hypothesis (FMH) 55
7.3. Predicting Collapse 56
8. The Threat is Existential 58
9. Discussion 59
STRATEGIES FOR A CHANGING WORLD 1
1. Whole of Government 5
2. Risk and Resilience 8
3. Complex and Emergent CIKR 12
3.1. Communications and IT 13
3.2. Internet and Cybersecurity 15
4. Surveillance Capitalism 17
5. Industrial Control Systems 19
6. Global Pandemics 22
7. Transportation and Supply Chains 23
8. Banking and Finance 25
9. Discussion 27
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.