Skip to main content

Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation

Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation

Ted G. Lewis PhD

ISBN: 978-1-118-61198-2

Oct 2013

486 pages

Select type: E-Book

Product not available for purchase

Description

A scientific approach to the new field of critical infrastructure protection


This book offers a unique scientific approach to the new field of critical infrastructure protection: it uses network theory, optimization theory, and simulation software to analyze and understand how infrastructure sectors evolve, where they are vulnerable, and how they can best be protected. The author demonstrates that infrastructure sectors as diverse as water, power, energy, telecommunications, and the Internet have remarkably similar structures. This observation leads to a rigorous approach to vulnerability analysis in all of these sectors. The analyst can then decide the best way to allocate limited funds to minimize risk, regardless of industry sector.

The key question addressed in this timely book is: What should be protected and how? The author proposes that the answer lies in allocating a nation's scarce resources to the most critical components of each infra-structure--the so-called critical nodes. Using network theory as a foundation, readers learn how to identifya small handful of critical nodes and then allocate resources to reduce or eliminate risk across the entire sector.

A comprehensive set of electronic media is provided on a CD-ROM in the back of the book that supports in-class and self-tutored instruction. Students can copy these professionally produced audio-video lectures onto a PC (Microsoft Windows(r) and Apple Macintosh(r) compatible) for repeated viewing at their own pace. Another unique feature of the book is the open-source software for demonstrating concepts and streamlining the math needed for vulnerability analysis. Updates, as well as a discussion forum, are available from www.CHDS.us.

This book is essential for all corporate, government agency, and military professionals tasked with assessingvulnerability and developing and implementing protection systems. In addition, the book is recommended for upper-level undergraduate and graduate students studying national security, computing, and other disciplines where infrastructure security is an issue.
Preface.

About the Author.

1. Strategy.

2. Origins.

3. Challenges.

4. Networks.

5. Vulnerability Analysis.

6. Risk Analysis.

7. Water.

8. SCADA.

9. Power.

10. Energy.

11. Telecommunications.

12. Internet.

13. Cyber-Threats.

14. Cyber-Security.

"...excellent for use as a text in information assurance or cyber-security courses...I strongly advocate that professors...examine this book with the intention of using it in their programs." (Computing Reviews.com, March 22, 2007)

"The book is written as a student textbook, but it should be equally valuable for current practitioners...this book is a very worthwhile investment." (Homeland Security Watch, August 17, 2006)

  • Applies network theory, optimization theory, and simulation software to analyze and understand how various infrastructure sectors evolve, what makes them vulnerable, and how they can be harden
  • Emphasizes the development of policies that lead to successful prevention of terrorist attacks on the nation’s infrastructure
    • Substitutes scientific methods for subjective experience in the process of assessing infrastructure risks
    • Reduces the complex problem of protecting water supplies, energy pipelines, telecommunication stations, Internet and Web networks, and power grids to a much simpler problem of protecting a few critical nodes
    • Solves one of the primary problems of critical infrastructure protection – the problem of enormous size and complexity
    • Provides a comprehensive approach to analysis, assessment, and risk reduction to help the policy-maker decide how best to allocate limited funds to prevent successful attacks
    • Includes a comprehensive set of electronic media is provided on a CD-ROM in the back of the book that supports in-class and self-tutored instruction
  • Provides an Instructor's Manual for academic adopters of the book