Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Critical infrastructure

While it is not so easy to definitively define terrorism and/or the terrorist, we have less difficulty identifying the likely targets of terrorists. In America, we call these likely targets our critical infrastructure. [Pg.42]

Among other things, the new emphasis on homeland security pointed to the need to protect and enhance the security of the nation s critical infrastructure. Critical infrastructure can be defined or listed in many ways. Generally, governments use the term to describe material assets that are essential for the functioning of an economy and a society. For the purpose of this text, critical infrastructure is defined as those assets of physical and computer-based systems that are essential to the minimum operations of our economy and government. Critical infrastructures (in the authors opinion), are the following ... [Pg.42]

We hope that this book and the others in the critical infrastructure series will aid in the prevention and mitigation of deliberate attacks. [Pg.45]

HSPD -7 Critical Infrastructure Identification, Prioritization, and Protection. Establishes a national policy for federal departments and agencies to identify and prioritize critical U.S. infrastructure and key resources and to protect them from terrorist attacks. [Pg.54]

It is important to point out that post-9/11 the chemical industry sector has taken great strides to protect its critical infrastructure. For instance, government and industry have developed vulnerability assessment methodologies for critical infrastructure systems and trained thousands of auditors and others to conduct them. [Pg.66]

Clark, R. M., and R. A. Deininger. 2000. Protecting the nation s critical infrastructure The vulnerability of U.S. water supply systems. Journal of Contingencies and Crisis Management 8 (2) 76-80. [Pg.95]

In 2000, the FBI identified and listed threats to critical infrastructure. These threats are listed and described in table 7.1. [Pg.117]

Sandia National Laboratories Common Vulnerabilities in Critical Infrastructure Control Systems described some of the common problems it has identified in the following five categories (Stamp et al. 2003) ... [Pg.122]

In July 2002, the National Infrastructure Protection Center (NIPC) reported that the potential for compound cyber and physical attacks, referred to as swarming attacks, is an emerging threat to the U.S. critical infrastructure. As NIPC reports, the effects of a swarming attack include slowing or complicating the response to a physical attack. [Pg.126]

The President s Critical Infrastructure Protection Board and the Department of Energy (DOE) have developed the steps outlined below to help organizations improve the security of their SCADA networks. DOE (2001) points out that these steps are not meant to be prescriptive or all-inclusive. However, they do address essential actions to be taken to improve the protection of SCADA networks. The steps are divided into two categories specific actions to improve implementation, and actions to establish essential underlying management processes and policies. [Pg.128]

Federal Bureau of Investigation (FBI). 2000. Threats to critical infrastructure. Washington, DC Federal Bureau of Investigation. [Pg.135]

Government Accountability Office (GAO). 2003. Critical infrastructure protection Challenges in securing control systems. Washington, DC Government Accountability Office. [Pg.135]

Stamp, J., et al, 2003. Common vulnerabilities in critical infrastructure control systems. 2nd ed. Albuquerque, NM Sandia National Laboratories. [Pg.135]

The term terrorism, according to HSA, Sect. 4(15), is defined as any activity that — (A) involves an act that — (i) is dangerous to human life or potentially destructive of critical infrastructure or key resources and (ii) is a violation of the criminal laws of the United States or of any State or other subdivision of the United States and (B) appears to be intended — (i) to intimidate or coerce a civilian population (ii) to influence the policy or a government by intimidation or coercion or (iii) to affect the conduct of a government by mass destruction, assassination, or kidnapping. [Pg.265]

Stevens, G.M. Congressional Research Service, Homeland Security Act of 2002 Critical Infrastructure Information Act (28 February 2003). [Pg.277]

Partnership for Critical Infrastructure Security (PCIS) http //www.pcis.org... [Pg.41]

Keywords Critical information infrastructure Critical Infrastructure Protection Security... [Pg.57]

This paper first discusses critical infrastructures, its relation with security concepts, and the features that are relevant for understanding the challenges they pose to society. Then, the critical information infrastructure is analyzed, with reflections on the requirements and constraint for its protection, and the... [Pg.57]


See other pages where Critical infrastructure is mentioned: [Pg.1012]    [Pg.147]    [Pg.105]    [Pg.12]    [Pg.6]    [Pg.8]    [Pg.9]    [Pg.27]    [Pg.42]    [Pg.42]    [Pg.43]    [Pg.44]    [Pg.44]    [Pg.45]    [Pg.45]    [Pg.64]    [Pg.117]    [Pg.118]    [Pg.126]    [Pg.191]    [Pg.214]    [Pg.214]    [Pg.215]    [Pg.8]    [Pg.273]    [Pg.286]    [Pg.413]    [Pg.44]    [Pg.50]    [Pg.57]    [Pg.58]   
See also in sourсe #XX -- [ Pg.33 , Pg.36 ]




SEARCH



Infrastructure

Network-critical physical infrastructure

© 2024 chempedia.info