Muutke küpsiste eelistusi

Homeland Security and Private Sector Business: Corporations' Role in Critical Infrastructure Protection [Kõva köide]

(Advantages SCI, El Segundo, California, USA)
  • Formaat: Hardback, 264 pages, kõrgus x laius: 234x156 mm, kaal: 567 g, PPI 426; 15 Tables, black and white; 27 Illustrations, black and white
  • Ilmumisaeg: 21-Oct-2008
  • Kirjastus: Auerbach
  • ISBN-10: 1420070789
  • ISBN-13: 9781420070781
  • Kõva köide
  • Hind: 101,79 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Hardback, 264 pages, kõrgus x laius: 234x156 mm, kaal: 567 g, PPI 426; 15 Tables, black and white; 27 Illustrations, black and white
  • Ilmumisaeg: 21-Oct-2008
  • Kirjastus: Auerbach
  • ISBN-10: 1420070789
  • ISBN-13: 9781420070781
The challenge in combating terrorism is not that any of us could die tomorrow in an attack, but that we cannot seem to perform the basic functions of diagnosing and treating the problem so that it is manageable. Given this, and because public and private sector partnerships are critical to the success of this management, Homeland Security and Private Sector Business: Corporations Role in Critical Infrastructure Protection identifies the role the private sector plays in securing our homeland and offers strategies to aid in the fight against national and international threats.









Organized to take into consideration differing leadership and management styles, organizational cultural change barriers, and team dynamics, the information is structured to appeal to most adult learning styles, ensuring effective communication of critical messages. Using helpful case studies and exercises, the author presents invaluable instruction on how to establish, implement, and reinforce terrorism awareness and regulatory compliance with national critical infrastructure interests. Comprehensive in scope, the book reviews threat factors, risk mitigation, readiness plans, prevention approaches, human factors, and training methods. It concludes with insights into the limitations businesses must respect as they adjust to this new paradigm.















A recognized expert in terrorism deterrence and counterintelligence methods, Elsa Lee brings her 28 years of experience in counterterrorism, counterintelligence, and counterespionage investigations to inform the discussion. Organizations which integrate her recommendations into their internal corporate strategies will not only contribute to Homeland Security efforts, but will also ultimately improve business continuity, resiliency, and operational and financial security for the corporation.

Arvustused

"Citing numerous sources, the author, a former counterintelligence agent with the U.S. Army, does a nice job of outlining the fundamentals of terrorism, DHS, threat methodology, risk mitigation, and preparation. Nearly 50 pages are devoted to human dynamics and organizational management, and the appendix provides a good example of a basic security plan for small business." Erik Antons, CPP, PSP, in Security Management

Preface xi
Acknowledgments xv
About the Author xvii
Introduction: Homeland Security Vision
1(24)
The Desired State of Homeland Security
1(3)
The Current State of Homeland Security
4(5)
Homeland Security Issues and Challenges
9(2)
Everyone Has a Role in Homeland Security
11(1)
History of Terrorism
12(2)
The Direct Impact of Modern-Day Terrorism
14(1)
What's at Stake with Today's Terrorist Attacks
15(5)
Countering Terrorism with DHS Help
20(3)
DHS Help Is Not Enough
23(2)
Essential Threat Factors
25(28)
The Problem We Face with Threats
25(2)
General Threats to Security Hierarchy Components
27(2)
General Threat Effect on Homeland Security
29(1)
Threat Management Through Intelligence
30(3)
Terrorists' Operational Methodology
33(4)
Limitations of Early Warnings
37(3)
Creating Your Own Threat-Warning Capabilities
40(1)
Painful Lesson: The USS Cole Attack
41(2)
Implications of Not Understanding Threats
43(2)
Lesson Learned: First World Trade Center Attack, 1993
45(1)
Lesson Learned: First American Hijacking, 1961
45(1)
Homeland Security Roles and Misconceptions
46(2)
Sharing Information
48(1)
Threat Trends
49(2)
Conclusion
51(2)
Threat, Vulnerability, and Risk Components
53(30)
Overview
53(4)
DHS Risk Model and National Infrastructure Protection Plan (NIPP)
57(3)
Responsibility and Accountability per DHS
60(1)
How to Perform Your Own Threat Assessment
60(1)
NIPP as a Template
61(3)
A Framework for Taking the NIPP Approach
64(1)
A Framework for Assessing Threat
65(5)
What the Results Suggest
70(2)
Terrorist Activity Indicators
71(1)
Espionage or Insider Threats
71(1)
Information and Technical Threats
71(1)
How to Handle Discoveries of Threat and Vulnerabilities
72(4)
Determining Vulnerability
73(3)
Countermeasure
76(1)
Reporting Information
77(1)
Cost versus Investment
78(3)
Penalties
80(1)
Mini Case Study
81(2)
Risk Mitigation, Transference, and Elimination
83(12)
Risk Decision Principles
84(5)
Lessons Not Easily Learned
89(6)
Readiness Plans: Develop, Validate, and Update
95(24)
Overview
95(3)
How Terrorists Plan
98(1)
Collaboration with External Organizations
99(3)
Beginning the Development Process
102(3)
Plan Development
105(2)
Overlooked Plan Items
107(7)
Internal Communications Considerations
108(1)
External Communications
109(1)
Crisis and Media Communications
109(2)
Plan Response for Bomb Threats
111(1)
Addressing Loading Docks and Mailrooms
112(1)
Plan Validation
113(1)
Plan Updates
114(1)
Plan to Share Information
114(3)
What DHS Says about Protected Critical Infrastructure Information (PCII)
117(2)
Prevention, Detection, and Response Factors across Sectors
119(22)
Overview
119(5)
Innovative Prevention Approaches
124(3)
Innovative Detection Technology
127(1)
Investing in Response Capabilities through Partnership
128(4)
Other Contributors to Homeland Security
132(1)
Response Considerations
133(2)
Preparedness Snapshot
135(1)
Case Study
136(5)
Human Factors and Team Dynamics
141(28)
The Human Factor
141(1)
Humanity in Crisis and Hero Mode
142(1)
Female Terrorists: The Human Factor Gone Wrong
143(1)
Humans in Conflict
144(2)
Human Overconfidence
146(3)
Human Technology
149(2)
SuperDiversity
151(1)
Diversity as a Problem Solver
152(1)
The ``Human Factor'' as a Tool
153(3)
Dysfunctional Group Dynamics
156(2)
Discussion versus Dialogue
158(1)
How to Get your Team to Dialogue
159(1)
Leadership versus Management
160(2)
Roadblocks to Effective TeamWork
162(5)
Roadblock 1: Lack of Proper Foundation
164(1)
Roadblock 2: Linguistic Differences
165(1)
Roadblock 3: Conflicts
166(1)
Chapter Exercise
167(2)
Toolkits and Innovative Ideas for Change
169(28)
Overview
169(1)
Organizational Leadership
170(1)
Fundamental Management Knowledge
171(2)
Stephen Covey
171(2)
Problem-Solving Exercises
173(3)
Appreciation Exercises: Extracting Maximum Information from Facts
173(1)
How to Use the Tool
174(1)
Example
174(1)
Key Points
174(1)
5 Whys: Quickly Getting to the Root of a Problem
174(1)
Why Use the Tool?
174(1)
How to Use the Tool
175(1)
Example
175(1)
Key Points
175(1)
Fundamental Terrorism Knowledge
176(6)
Gary Berntsen
176(1)
Peter L. Bergen
177(1)
Michael Scheuer
177(1)
Steven Emerson
178(1)
Brian Jenkins
178(1)
Jessica Stern
179(1)
Wafa Sultan
180(2)
Why Workforce Breakdown Is Critical (by personality type, leadership style, and team role)
182(4)
Theory X and Theory Y
182(1)
Myers-Briggs Type Indicator
183(3)
Group Roles and Team Roles
186(2)
Low-Context and High-Context Communications
188(1)
Reactive versus Proactive Language
189(2)
Active Listening
190(1)
What to Avoid
190(1)
What We Achieve by Listening
190(1)
How to Listen
190(1)
What to Do
190(1)
The Forming, Storming, Norming, Performing Model
191(3)
Chapter Exercise
194(3)
Training and Exercises: Touch It, Feel It, Live It, Breathe It!
197(22)
Overview
197(1)
Benefits of Training
198(1)
Adult Learning
199(1)
Training Methods
200(3)
Crawl Walk Run Methodology
203(2)
Video Example for Training
205(1)
Another Show Solving a Problem
205(1)
Exercises
206(5)
Building an Exercise
211(2)
Other Key Factors
211(1)
How Often Should You Exercise?
212(1)
Training Evaluation
213(2)
Training Failures
215(1)
A Subjective Method for Calculating Return on Investment (ROI)
216(3)
You Can Deter But You Can't Interdict: Don't Cross the Line!
219(6)
Know Thy Limits
219(1)
Distinctions between Collecting information and Collecting Intelligence
220(1)
How to Avoid Botching Up an Investigation
221(2)
Stumbling across Evidence of a Crime: How to Preserve It and Relinquish It to Law Enforcement Agencies
223(2)
Appendix A: National Infrastructure Protection Plan --- Table of Contents
225(6)
Appendix B: ASCE Report on Critical Infrastructure
231(8)
Appendix C: Bomb Threat Checklist
239(2)
Appendix D: Best Practices for Mail Center Security
241(6)
General Mail Operation Preventive Recommendation
241(1)
Employee Security Procedures
242(1)
General Safety and Security Procedures for Incoming-Outgoing Mail Areas
243(1)
Access to Information: Education and Communications
244(1)
Guidelines for Mail Center Theft Prevention
245(2)
Appendix E: FY07 National Incident Management System (NIMS) Training Guidelines
247(2)
Appendix F: Fact Sheet on Dirty Bombs
249(4)
Background
249(1)
Impact of a Dirty Bomb
249(1)
Protective Actions
250(1)
Sources of Radioactive Material
250(1)
Control of Radioactive Material
251(1)
Risk of Cancer
251(1)
Other Contact information
252(1)
Appendix G: Arab American Psychiatrist Wafa Sultan
253(4)
There Is No Clash of Civilizations But a Clash between the Mentality of the Middle Ages and That of the 21st Century
253(4)
Reference
255(2)
Appendix H: Homeland Security Exercise and Evaluation Program
257(8)
Index 265
Advantages SCI, El Segundo, California, USA