Safeguarding Infrastructure Assets from Cyber-terrorism: Measuring and Protecting SCADA

Safeguarding Infrastructure Assets from Cyber-terrorism: Measuring and Protecting SCADA systems from Cyber-terrorists in AustraliaTerrorist groups are currently using information and communication technologies to orchestrate their conventional attacks. More recently, terrorists have been developing a new form of cyber-capability to coordinate cyber attacks. This book explores the possibility that cyber-terrorists may have developed or may have future capabilities to attack critical infrastructure by accessing Supervisory Control and Data Acquisition (SCADA) systems within Australia and throughout the world. The book characterises the Australian security and terrorism environment and discusses the vulnerability of Australian computer systems and control systems. It also discusses the cyber-capability of various terrorist groups, SCADA risk evaluation methods and presents a framework to measure and protect SCADA systems from the threat of cyber-terrorism within Australia. This framework forms the main basis of this research and is examined by three focus group interviews, signifying the need for new counter-terrorism security models to assist with assessing new cyber security threats such as cyber-terrorism. This contribution is of great value to the SCADA community and organisations.

Price: $111.00

Click here to buy from Amazon

Critical Infrastructure Protection II

Critical Infrastructure Protection II (IFIP International Federation for Information Processing) (IFIP Advances in Information and Communication Technology) (v. 2)The information infrastructure—comprising computers, embedded devices, networks and software systems—is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed.

Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include:

– Themes and Issues

– Infrastructure Security

– Control Systems Security

– Security Strategies

– Infrastructure Interdependencies

– Infrastructure Modeling and Simulation

This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.

Critical Infrastructure Protection II is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

Mauricio Papa is an Associate Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.

Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.

Price: $199.00

Click here to buy from Amazon

A Guide to Utility Automation: Amr, Scada, and It Systems for Electric Power

A Guide to Utility Automation: Amr, Scada, and It Systems for Electric PowerProvides a history of AMR, Automatic Meter Reading system, describing the essential attributes of families of AMR system technologies and notable suppliers. Discusses the vital competitive importance of new information systems and their needs for AMR data providing examples of how these systems can create strategic competitive advantage.







Price: $59.00

Click here to buy from Amazon

Energy Infrastructure Protection and Homeland Security

Energy Infrastructure Protection and Homeland SecurityIn the post-9/11 world, the possibility of energy infrastructure-terrorism_the use of weapons to cause devastating damage to the energy industrial sector along with its cascading effects_is very real. Energy Infrastructure Protection and Homeland Security is a reference for those involved with our energy infrastructure who want quick answers to complicated questions. It is intended to help employers and employees handle security threats they must be prepared to meet on a daily basis. This book focuses on the three interrelated energy infrastructure segments: electricity, petroleum, and natural gas. It presents common-sense methodologies in a straightforward manner and is accessible to those who have no experience with energy infrastructure or homeland security. Readers gain an understanding of the challenge of domestic preparedness_that is, an immediate need for a heightened state of awareness of the present threat facing the energy infrastructure industrial sector as a potential terrorist target_as well as knowledge of security principles and measures that can be implemented, adding a critical component not only to one's professional knowledge but also giving one the tools needed to combat terrorism.

Price: $85.00

Click here to buy from Amazon

Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection

Critical Infrastructure Protection IV: Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, ... in Information and Communication Technology)The information infrastructure—comprising computers, embedded devices, networks and software systems—is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. Critical Infrastructure Protection IV describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Themes and Issues, Control Systems Security, Infrastructure Security, Infrastructure Modeling and Simulation, and Risk Management. This book is the fourth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of seventeen edited papers from the Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at the National Defense University, Washington, DC, USA in the spring of 2010. Critical Infrastructure Protection IV is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security. Tyler Moore is a Postdoctoral Fellow at the Center for Research on Computation and Society, Harvard University, Cambridge, Massachusetts, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science at the University of Tulsa, Tulsa, Oklahoma, USA.

Price: $109.00

Click here to buy from Amazon