Acronyms and Abbreviations |
|
xi | |
Preface |
|
xiii | |
Prologue---No Calls in the Wild |
|
1 | (10) |
|
|
11 | (8) |
|
We Feel It Because of a Need; It Is the Need to Communicate |
|
|
11 | (2) |
|
|
13 | (5) |
|
|
18 | (1) |
|
References and Recommended Reading |
|
|
18 | (1) |
|
2 Terrorist Attacks Against Americans |
|
|
19 | (22) |
|
|
19 | (8) |
|
|
27 | (12) |
|
References and Recommended Reading |
|
|
39 | (2) |
|
3 Critical Infrastructure |
|
|
41 | (14) |
|
What Is Critical Infrastructure? |
|
|
41 | (3) |
|
|
44 | (6) |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
Broadcasting Infrastructure |
|
|
52 | (1) |
|
|
53 | (1) |
|
References and Recommended Reading |
|
|
54 | (1) |
|
4 Communications Sector Security |
|
|
55 | (10) |
|
Mr. Grasshopper and Mr. Rabbit #1 |
|
|
56 | (1) |
|
|
56 | (1) |
|
Communications Sector Security Goals and Attributes |
|
|
57 | (2) |
|
Homeland Security Directives |
|
|
59 | (1) |
|
|
59 | (4) |
|
References and Recommended Reading |
|
|
63 | (2) |
|
5 Vulnerability Assessment (VA) |
|
|
65 | (32) |
|
|
65 | (1) |
|
Assessing Vulnerabilities |
|
|
66 | (2) |
|
Mr. Grasshopper and Mr. Rabbit Conversation #2 |
|
|
68 | (1) |
|
Insider Threat Vulnerability |
|
|
69 | (6) |
|
Vulnerability Assessment (VA) |
|
|
75 | (9) |
|
Vulnerability Assessment Methodology |
|
|
84 | (7) |
|
Vulnerability Assessment Procedures |
|
|
91 | (3) |
|
Vulnerability Assessment: Checklist Procedure |
|
|
94 | (1) |
|
References and Recommended Reading |
|
|
95 | (2) |
|
6 Preparation: When Is Enough, Enough? |
|
|
97 | (12) |
|
|
98 | (1) |
|
|
98 | (2) |
|
|
100 | (2) |
|
|
102 | (5) |
|
|
107 | (1) |
|
References and Recommended Reading |
|
|
107 | (2) |
|
7 Cybersecurity and SCADA |
|
|
109 | (32) |
|
|
112 | (6) |
|
|
118 | (2) |
|
|
120 | (2) |
|
|
122 | (8) |
|
Steps to Improve SCADA Security |
|
|
130 | (8) |
|
References and Recommended Reading |
|
|
138 | (3) |
|
|
141 | (14) |
|
Communications Sector Contingency Planning |
|
|
143 | (1) |
|
Crisis Communications Plan |
|
|
144 | (9) |
|
|
153 | (1) |
|
References and Recommended Reading |
|
|
153 | (2) |
|
9 Security Techniques and Hardware |
|
|
155 | (68) |
|
The Multiple-Barrier Approach |
|
|
155 | (6) |
|
Security Hardware Devices |
|
|
161 | (52) |
|
Communication Integration |
|
|
213 | (4) |
|
|
217 | (4) |
|
References and Recommended Reading |
|
|
221 | (2) |
|
|
223 | (14) |
|
Fourteen Features of Active and Effective Security |
|
|
224 | (11) |
|
References and Recommended Reading |
|
|
235 | (2) |
Glossary |
|
237 | (22) |
Index |
|
259 | (12) |
About the Author |
|
271 | |