This updated second edition focuses on all components of the energy sector, including sites involved in producing, refining, transporting, generating, transmitting, conserving, building, distributing, maintaining, and controlling energy systems and system components. This text presents common-sense methodologies in a straightforward manner and is accessible to those who have no experience with energy infrastructure or homeland security. It is intended to help employers and employees handle security threats they must be prepared to meet on a daily basis.
This updated second edition focuses on all components of the energy sector, including sites involved in producing, refining, transporting, generating, transmitting, conserving, building, distributing, maintaining, and controlling energy systems and system components. This text presents common-sense methodologies in a straightforward manner and is accessible to those who have no experience with energy infrastructure or homeland security. It is intended to help employers and employees handle security threats they must be prepared to meet on a daily basis.
CONTENTS Preface Chapter 1 Introduction U.S. Energy Infrastructure: Kid in Candy Store Syndrome We Call it 9/11; others Call it Cantor Fitzgerald Case Study 1.1 When Whiskey Sours Case Study 2.1 Bracing for the Big One! What is Terrorism? Vocabulary of Hate References and Recommended Reading Chapter 2 Critical Infrastructure What is Critical Infrastructure? Energy Sector Infrastructure The Bottom Line References and Recommended Reading Chapter 3 The Energy Sector Introduction Electricity Petroleum Natural Gas Energy Sector: A Regulated Environment The Bottom Line References and Recommended Reading Chapter 4 Energy Sector Security Introduction Energy Assets and System Parameters Homeland Security Directives Assessing Consequences References and Recommended Reading Chapter 5 Vulnerability Assessments (VA) Introduction Vulnerabilities Insider Threat Vulnerability Vulnerability Assessment (VA) Vulnerability Assessment Methodology Vulnerability Assessment Procedures Vulnerability Assessment: Checklist Procedure References and Recommended Reading Chapter 6 Preparation: When is Enough, Enough? Introduction Threats and Incidents Response to Threats Preparation Site Characterization and Sampling References and Recommended Reading Chapter 7 SCADA The Energy Sector & Cyberspace What is SCADA? SCADA Vulnerabilities Steps to Improve SCADA Security References and Recommended Reading Chapter 8 Emergency Response Energy Sector Contingency Planning Emergency Support Function #12: Energy Sector Emergency Response Planning (ERP): Standard Template OSHA and Emergency Response The Bottom Line References and Recommended Reading Chapter 9 Security Techniques & Hardware Security Hardware Devices Petrochemical and Waste Monitoring Devices Communication Integration Cyber Protection Devices References and Recommended Reading Chapter 10 The Paradigm Shift The 14 Features of Active & Effective Security Reference and Recommended Reading Appendix A Definitions of Terms
CONTENTS Preface Chapter 1 Introduction U.S. Energy Infrastructure: Kid in Candy Store Syndrome We Call it 9/11; others Call it Cantor Fitzgerald Case Study 1.1 When Whiskey Sours Case Study 2.1 Bracing for the Big One! What is Terrorism? Vocabulary of Hate References and Recommended Reading Chapter 2 Critical Infrastructure What is Critical Infrastructure? Energy Sector Infrastructure The Bottom Line References and Recommended Reading Chapter 3 The Energy Sector Introduction Electricity Petroleum Natural Gas Energy Sector: A Regulated Environment The Bottom Line References and Recommended Reading Chapter 4 Energy Sector Security Introduction Energy Assets and System Parameters Homeland Security Directives Assessing Consequences References and Recommended Reading Chapter 5 Vulnerability Assessments (VA) Introduction Vulnerabilities Insider Threat Vulnerability Vulnerability Assessment (VA) Vulnerability Assessment Methodology Vulnerability Assessment Procedures Vulnerability Assessment: Checklist Procedure References and Recommended Reading Chapter 6 Preparation: When is Enough, Enough? Introduction Threats and Incidents Response to Threats Preparation Site Characterization and Sampling References and Recommended Reading Chapter 7 SCADA The Energy Sector & Cyberspace What is SCADA? SCADA Vulnerabilities Steps to Improve SCADA Security References and Recommended Reading Chapter 8 Emergency Response Energy Sector Contingency Planning Emergency Support Function #12: Energy Sector Emergency Response Planning (ERP): Standard Template OSHA and Emergency Response The Bottom Line References and Recommended Reading Chapter 9 Security Techniques & Hardware Security Hardware Devices Petrochemical and Waste Monitoring Devices Communication Integration Cyber Protection Devices References and Recommended Reading Chapter 10 The Paradigm Shift The 14 Features of Active & Effective Security Reference and Recommended Reading Appendix A Definitions of Terms
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309