Muutke küpsiste eelistusi

E-raamat: Homeland Security and Private Sector Business: Corporations' Role in Critical Infrastructure Protection, Second Edition

(Advantage SCI, LLC, El Segundo, California, USA)
  • Formaat: 288 pages
  • Ilmumisaeg: 11-Dec-2014
  • Kirjastus: CRC Press Inc
  • ISBN-13: 9781482248593
  • Formaat - PDF+DRM
  • Hind: 71,49 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 288 pages
  • Ilmumisaeg: 11-Dec-2014
  • Kirjastus: CRC Press Inc
  • ISBN-13: 9781482248593

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Since 9/11, the U.S. government and the private sector have devised sophisticated ways of protecting people and assets. The threats have evolved, however, becoming more insidious. They no longer comprise just terrorists who target critical infrastructures. They also include insider threats, such as PFC Manning and NSA contractor Snowden who leaked classified defense information, active shooter incidents like the Sandy Hook Elementary School massacre, and the 2013 Boston Marathon terrorist bombing. These events make it imperative for the public and private sectors to engage in effective partnership to protect people, facilities, and national infrastructure assets.

Homeland Security and Private Sector Business: Corporations' Role in Critical Infrastructure Protection, Second Edition identifies the role the private sector plays in securing our homeland and offers strategies to aid in the fight against national and international threats. Addressing mandates and legislation introduced since the first edition, this new edition includes:











Updates to the NIPP (National Infrastructure Protection Plan) New case studies of both proper security policies and procedures in practice versus costly security breaches Greater focus on smaller business and practical "immediate use" guidance New measures for assessing and addressing vulnerabilities and threats New appendices with sample plans and practical checklists

Supplying tools that can easily be adapted and applied to every business situation at all budget levels, the book helps businesses counter the total threat, from traditional terrorists to inside betrayersproviding a clear blueprint for securing people and assets.

Arvustused

"Lee argues that while terrorism is one threat, there are many risks that require a thorough understanding of the causes and effects of 17 critical factors that threaten many key resources. From chemical warfare to cyber threats, workplace violence to narcotics trafficking, Lee emphasizes the need to constantly learn from every incident as past lessons are not easily learned. Real cases prove her points. This is a must read for those who care about national security." Senator Ted W. Lieu (D), State Senator of Senate District 28

Preface xi
Acknowledgments xv
About the Author xvii
1 Introduction: Homeland Security Vision The Desired State of Homeland Security 1(26)
The Current State of Homeland Security
4(5)
Homeland Security Issues and Challenges
9(3)
Everyone Has a Role in Homeland Security
12(2)
History of Terrorism
14(1)
The Direct Impact of Modern-Day Terrorism
15(2)
What Is at Stake with Today's Terrorist Attacks
17(4)
Countering Terrorism with Help from the Department of Homeland Security
21(5)
Help from the Department of Homeland Security Is Not Enough
26(1)
2 Essential Threat Factors 27(32)
The Problem We Face with Threats
27(2)
General Threats to Security Hierarchy Components
29(3)
General Threat Effect on Homeland Security
32(1)
Threat Management through Intelligence
33(4)
Terrorists' Operational Methodology
37(4)
Limitations of Early Warnings
41(3)
Post-9/11 Era Threats and Warnings
44(3)
Boston Marathon Bombing
44(1)
Elliot Rodger's Killing Rampage
45(1)
Chinese Cyberattacks against U.S. Companies
46(1)
Insider Threat
47(1)
Creating Your Own Threat-Warning Capabilities
47(2)
Painful Lesson: The USS Cole Attack
49(1)
The Consequences of Not Understanding Threats
50(2)
Lessons Learned: First World Trade Center Attack, 1993
52(1)
Lessons Learned: First American Hijacking, 1961
53(1)
Homeland Security Roles and Misconceptions
53(2)
Sharing Information
55(2)
Conclusion
57(2)
3 National Infrastructure Protection Plan for Threats, Vulnerability, Risk, and Resilience 59(32)
Overview
59(5)
The Department of Homeland Security (DHS) Risk Model and National Infrastructure Protection Plan (NIPP)
64(3)
Responsibility and Accountability per DHS
67(1)
NIPP as a Template
68(1)
A Practical Framework for Taking the NIPP Approach
69(2)
A Practical Framework for Assessing Threat
71(5)
What the Results Suggest
76(2)
How to Handle Discoveries of Threat and Vulnerabilities
78(1)
Determining Vulnerability
79(3)
Simplified Assessment Model
82(1)
Countermeasures
83(2)
Reporting Information
85(1)
Cost versus Investment
86(1)
Penalties
87(1)
Methods for Small Business Security Practices
87(2)
Mini Case Study
89(2)
4 Risk Mitigation, Transference, and Elimination 91(12)
Risk Decision Principles
93(4)
Risk Management
97(2)
Lessons Not Easily Learned
99(4)
5 Readiness Plans: Develop, Validate, and Update 103(24)
Overview
103(3)
How Terrorists Plan
106(2)
Collaboration with External Organizations
108(2)
Preplan Development Process
110(3)
Plan Development
113(2)
Overlooked Plan Items
115(6)
Internal Communications Considerations
115(1)
External Communications
116(1)
Crisis and Media Communications
116(2)
Cybersecurity Planning
118(1)
Plan Response for Bomb Threats
119(1)
Addressing Loading Docks and Mailrooms
120(1)
Plan Validation and Maintenance
121(1)
Plan Updates
122(1)
Plan to Share Information
123(2)
What the DHS Says about Protected Critical Infrastructure Information
125(2)
6 Prevention, Detection, and Response Factors across Sectors 127(22)
Overview
127(2)
Innovative Prevention Approaches
129(4)
Innovative Detection Technology
133(1)
Investing in Response Capabilities through Partnership
133(4)
Case Study: Center for Homeland Defense and Security (CHDS) Alumnus Leads Review of SoCal Shooting Spree
137(2)
Other Contributors to Homeland Security
139(1)
Response Considerations
140(1)
Mini Case Study: Boston Marathon Bombing, April 15, 2013
141(2)
Preparedness Snapshot
143(1)
Historical Case Study
144(5)
7 Human Factors and Team Dynamics 149(28)
The Human Factor
149(1)
Humanity in Crisis and Hero Mode
150(1)
Female Terrorists: The Human Factor Gone Wrong
151(1)
Humans in Conflict
152(2)
Overconfidence
154(3)
Human Technology
157(1)
Superdiversity
158(2)
Diversity as a Problem Solver
160(1)
The Human Factor as a Tool
161(2)
Dysfunctional Group Dynamics
163(3)
Discussion versus Dialogue
166(1)
How to Get Your Team to Dialogue
167(1)
Leadership versus Management
168(2)
Roadblocks to Effective Teamwork
170(4)
Roadblock 1: Lack of Proper Foundation
171(1)
Roadblock 2: Linguistic Differences
172(1)
Roadblock 3: Conflicts
173(1)
Chapter Exercise
174(3)
8 Innovative Ideas for Change 177(22)
Overview
177(3)
Getting Assistance from the Federal Bureau of Investigation
180(1)
Organizational Leadership
180(2)
Problem-Solving Exercises
182(2)
Appreciation Exercises: Extracting Maximum Information from Facts
182(1)
How to Use the Tool
182(1)
Example
182(1)
Key Points
183(1)
5 Whys: Quickly Getting to the Root of a Problem
183(1)
Why Use the Tool?
183(1)
How to Use the Tool
183(1)
Example
184(1)
Key Points
184(1)
Why Workforce Breakdown Is Critical (by Personality Type, Leadership Style, and Team Role)
184(5)
Theory X and Theory Y
185(1)
Myers-Briggs Type Indicator
186(1)
Keirsey Temperament Sorter
187(2)
Group Roles and Team Roles
189(2)
Low-Context and High-Context Communications
191(1)
Reactive versus Proactive Language
192(2)
Active Listening
193(14)
What to Avoid
193(1)
What We Achieve by Listening
193(1)
How to Listen
193(1)
What to Do
193(1)
The Forming, Storming, Norming, Performing Model
194(3)
Chapter Exercise
197(2)
9 Training and Exercises: Touch It, Feel It, Live It, Breathe It! 199(26)
Overview
199(1)
Benefits of Training
200(1)
Adult Learning
201(1)
Training Methods
202(3)
Crawl-Walk-Run Methodology
205(2)
Video Example for Training
207(1)
Another Show Solving a Problem
207(1)
Exercises
208(5)
Building an Exercise
213(2)
Other Key Factors
213(1)
How Often Should You Exercise?
214(1)
Training Evaluation
215(2)
Educational Programs
217(2)
Training Case Study
219(1)
Training Failures
220(1)
Interview of Rear Admiral Tim Sullivan
221(2)
A Subjective Method for Calculating Return on Investment (ROI)
223(2)
10 You Can Deter, But You Can't Interdict: Don't Cross the Line! 225(6)
Know Thy Limits
225(1)
Distinctions between Collecting Information and Collecting Intelligence
226(1)
How to Avoid Botching an Investigation
227(2)
Stumbling across Evidence of a Crime: How to Preserve It and Relinquish It to Law Enforcement Agencies
229(2)
Appendix A: Sample Security Plan 231(8)
Section 1: About AlphaBravoCharlie
231(1)
Objectives
231(1)
My Security Plan Is Proprietary
231(1)
Section 2: Assessment Results
232(3)
Security
232(1)
Assets
233(1)
Risks
234(1)
Priorities
234(1)
Section 3: Security Plan
235(6)
Action Items
235(1)
Policy Changes
236(1)
User Education
236(1)
Project Time Line and Responsibilities
237(1)
Response Planning
237(1)
Ongoing Maintenance and Compliance
237(2)
Appendix B: Bomb Threat Checklist 239(2)
Appendix C: Best Practices for Mail Center Security 241(6)
General Mail Operation Preventive Recommendation
241(1)
Employee Security Procedures
242(1)
General Safety and Security Procedures for Incoming-Outgoing Mail Areas
243(1)
Access to Information: Education and Communications
244(1)
Guidelines for Mail Center Theft Prevention
245(2)
Appendix D: Fact Sheet on Dirty Bombs 247(4)
Background
247(1)
Impact of a Dirty Bomb
247(1)
Protective Actions
248(1)
Sources of Radioactive Material
248(1)
Control of Radioactive Material
248(1)
Risk of Cancer
249(1)
Other Contact Information
249(2)
Appendix E: The Insider Threat 251(4)
Index 255
Elsa Lee served as a U.S. Army counterintelligence officer and special agent for 20 years in the fight against terrorism and espionage in the United States, Europe, Central America, and Asia. She is now a lecturer and the CEO and founder of Advantage SCI, LLC, a professional services firm with offices in Washington, D.C.; Texas; and California. The company provides corporate, homeland, and national security services to government and private industry. Lee works with key member representatives of the critical national infrastructures, the academic community, and the U.S. government. She has been quoted extensively in national and international newspapers and professional journals and has appeared on Univision, Telemundo, CNN, Fox News, CBS News, Voice of America, and Canada Business Channel.