Muutke küpsiste eelistusi

E-raamat: Homeland Security Threats, Countermeasures, and Privacy Issues

  • Formaat: 312 pages
  • Ilmumisaeg: 31-May-2011
  • Kirjastus: Artech House Publishers
  • Keel: eng
  • ISBN-13: 9781608071074
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 132,21 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 312 pages
  • Ilmumisaeg: 31-May-2011
  • Kirjastus: Artech House Publishers
  • Keel: eng
  • ISBN-13: 9781608071074
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This timely book offers a solid understanding of the critical facets of homeland security, including threats, countermeasures, and privacy. Professionals find important discussions on how to overcome challenges in today's information systems and how to analyze emerging phenomena in large complex systems. The book offers detailed guidance on the model-based design of trustworthy health information systems. Moreover, practitioners get an in-depth overview of the detection, identification, and track of dangerous materials. This comprehensive resource also explores urban defence using mobile sensor platforms, focusing on both surveillance and protection. Supported with nearly 100 illustrations, "Homeland Security Facets" includes detailed case studies and real-world examples.
Preface xiii
1 The New Vision of the Homeland Security Scenario 1 (42)
1.1 Unveiling the New Scenario
1(5)
1.1.1 Tokyo Chemical Sarin Attack
2(1)
1.1.2 Murrach Federal Building Attack
3(1)
1.1.3 Beslan
3(1)
1.1.4 London Bombing
3(1)
1.1.5 Penetration of the U.S. Electric Grid
4(1)
1.1.6 Vandals Cut Phones and Internet Cables
5(1)
1.1.7 Stuxnet Computer Worm
5(1)
1.2 The New Rules and Operational Avenues
6(3)
1.3 The Last Step
9(1)
References
10(1)
Appendix 1A Team for Research in Ubiquitous Secure Technologies (TRUST)
11(24)
1A.1 Introduction
11(1)
1A.2 Research Overview
12(5)
1A.3 TRUST Research in Secure Financial Infrastructures
17(4)
1A.4 TRUST Research in Secure Health Infrastructures
21(4)
1A.5 TRUST Research in Secure Physical Infrastructures
25(3)
1A.6 Shared Experimental Facilities
28(6)
1A.7 Concluding Remarks
34(1)
Acknowledgments
35(1)
References
35(8)
2 Homeland Security and National Defense in the Twenty-First Century 43 (14)
2.1 The New World Scenario
43(2)
2.2 National Defense-Homeland Protection
45(1)
2.3 Network-Enabled Capability
45(3)
2.4 Net-Centric Warfare Doctrine and Technological Challenges
48(3)
2.5 The NEC Implementation in an Archetypal Nation: Italy
51(3)
2.6 Conclusions
54(1)
Selected Bibliography
55(2)
3 Homeland Security and Challenges in Information Systems 57 (28)
3.1 ICT and Society, ICT and Control Systems, and the Blurring from Both
57(10)
3.1.1
Chapter Overview
58(1)
3.1.2 Critical Infrastructure and ICT
58(3)
3.1.3 Critical Infrastructure and Control Systems
61(2)
3.1.4 The Mobility Trend
63(1)
3.1.5 Blurring Borders of ICT, General, and Mobile Infrastructure
64(1)
3.1.6 Globalization and Virtualization
65(1)
3.1.7 Need for Actions on the Policy Side: C(I)IP on the International and European Level
65(2)
3.2 The Information Security Challenge: E-Banking as an Example
67(4)
3.2.1 The Challenge to Secure General-Purpose Computers for E-Banking
67(2)
3.2.2 Countermeasures Against E-Banking Fraud
69(2)
3.3 Analysis of Research Needs in Critical Financial Infrastructure: Parsifal
71(5)
3.3.1 Project Overview
72(4)
3.4 Introducing Information Sharing: Key Challenges
76(3)
3.5 The Dilemma of Security-Privacy
79(3)
3.6 Conclusions
82(1)
References
83(1)
Selected Bibliography
83(2)
4 Analysis of Emerging Phenomena in Large Complex Systems 85(34)
4.1 Introduction
85(1)
4.2 The Challenge of Complex Systems
86(1)
4.3 The New Approach of System Engineering
87(3)
4.4 Study Cases
90(24)
4.4.1 The Traffic Congestion Phenomenon in Internet-Like Networks
91(9)
4.4.2 Domino Effect in a Large High-Voltage Electric Distribution Grid
100(5)
4.4.3 Interdependence Analysis in Large Critical Infrastructures
105(9)
4.5 Conclusions
114(1)
Acknowledgments
115(1)
References
115(4)
5 Model-Based Design of Trustworthy Health Information Systems 119 (16)
5.1 Introduction
119(3)
5.2 Patient-Centered Clinical Information Management Processes
122(3)
5.2.1 Patient Portals
123(1)
5.2.2 Patient Management Systems
124(1)
5.3 Policy Languages and Policy Composition
125(1)
5.4 Ethical and Legal Analysis
126(2)
5.5 Model-Based Design
128(2)
5.6 Model-Based Experiment Integration
130(1)
5.7 Closing the Loop: Patient-Centered Health Information Management Evaluation
130(1)
References
131(4)
6 Urban Defense Using Mobile Sensor Platforms: Surveillance, Protection, and Privacy 135 (38)
6.1 Introduction
135(7)
6.1.1 Urban Surveillance
135(1)
6.1.2 Video Camera Surveillance
136(4)
6.1.3 Fixed Video Camera Limitations and Emergence of Mobile Sensing
140(2)
6.2 MobEyes: Video Surveillance from Vehicular Platforms
142(6)
6.2.1 Vehicular Sensor Networks
142(2)
6.2.2 Related Work
144(2)
6.2.3 MobEyes Architecture
146(2)
6.3 MobEyes Urban Surveillance Examples
148(6)
6.3.1 The Westwood Scenario
148(1)
6.3.2 Data Validation
149(3)
6.3.3 Tracking Suspects Using MobEyes
152(2)
6.4 Secure, Selective Surveillance in Vehicular Networks
154(9)
6.4.1 Vehicular Security
154(1)
6.4.2 New Security Requirements for Urban Surveillance
155(1)
6.4.3 Attribute-Based Encryption: A Primer
156(2)
6.4.4 DABE: The Better Choice in Dynamic Environments
158(2)
6.4.5 Benefits of Dynamic Attribute-Based Encryption
160(2)
6.4.6 DABE in Homeland Defense Applications
162(1)
6.5 Conclusions
163(1)
References
164(3)
Appendix 6A The C-VeT Testbed
167(6)
6A.1 The C-VeT Architecture
167(3)
6A.2 MobiMESH
170(3)
7 Detection and identification of Dangerous Materials for Airport Security 173(28)
7.1 The Airport Transport Security Problem
173(3)
7.2 Standard Security Solutions and Issues
176(4)
7.3 Innovative Approach to Security
180(4)
7.4 Sensors for a Distributed Dangerous Object Detection/Classification System
184(4)
7.5 Indoor/Outdoor Noncooperative People Tracking
188(5)
7.6 Conclusions
193(1)
Acknowledgments
193(1)
References
194(3)
Appendix 7A List of Airport Security Measure Failures with Worst Consequences
197(4)
8 Privacy Versus Security: A Fight That May Turn into an Alliance 201 (16)
8.1 Introduction
201(2)
8.2 Privacy and Security and Safety: Their Definition and Correlation
203(2)
8.3 The Paradigm of Integrated Security and Safety Management
205(2)
8.4 The New Interpretation on the Security Role
207(2)
8.5 The Regulatory Framework and the Open Model of Assurance
209(2)
8.6 The New Model: The Archetypal Approach
211(4)
8.7 Conclusions
215(1)
References
215(2)
9 Privacy-Aware Design for the Monitoring, Control, and Protection of Critical Infrastructure 217 (20)
9.1 Introduction
217(1)
9.2 Sensor Networking Technologies for Infrastructure Protection
218(2)
9.3 Example Application Development: SCADA
220(4)
9.4 Privacy: Definitions and the Law
224(3)
9.5 Privacy Issue: The Market for Information
227(1)
9.6 Protecting Privacy: Privacy-Aware Design
228(3)
9.6.1 Provide Full Disclosure of Data Collection
228(1)
9.6.2 Require Consent to Data Collection
229(1)
9.6.3 Minimize the Collection of Personal Data
230(1)
9.6.4 Minimize the Identification of Data with Individuals
230(1)
9.6.5 Minimize and Secure Data Retention
230(1)
9.7 Privacy Problems and Advanced Sensing System: Demand Response Case Study
231(4)
9.7.1 Power Consumption Data Creates a Privacy Issue
231(2)
9.7.2 A Privacy-Aware Demand Response System
233(2)
9.8 Conclusion
235(1)
References
235(2)
10 Military Defense, Civil Defense, and Civil Protection Integration in a Multiscenario Crisis Event 237 (20)
10.1 Introduction
237(3)
10.1.1 Major Events
238(1)
10.1.2 Prospects and Problems
239(1)
10.2 Italian National Protection System
240(4)
10.2.1 Risk Assessment
240(1)
10.2.2 Planning Scenarios
240(1)
10.2.3 Security Tasks
240(1)
10.2.4 National Emergency Management System
241(3)
10.2.5 Recovery and Consequence Management
244(1)
10.3 System Criticality
244(2)
10.4 Summit G8 Security Planning
246(8)
10.4.1 Participants
248(1)
10.4.2 Planning and Organization
249(3)
10.4.3 Command and Control Security System
252(1)
10.4.4 Coordination Table
252(1)
10.4.5 Joint Operation Room
252(1)
10.4.6 Technical Management Center
253(1)
10.4.7 The Armed Forces Operation Room
254(1)
10.4.8 The International Operation Room
254(1)
10.5 Conclusions
254(1)
References
255(2)
11 Repel Boarders! 257 (16)
11.1 Introduction
257(1)
11.2 Pirates
258(1)
11.3 The Threat
259(2)
11.4 Prepare to Repel Boarders!
261(1)
11.5 Modern Solutions for the Antipiracy Issue
262(2)
11.5.1 The Ship Segment
262(1)
11.5.2 The Shore Segment
262(2)
11.6 A Recently Implemented Antipiracy System
264(6)
11.6.1 The Medusa EO System
264(3)
11.6.2 The Video Surveillance Unit
267(1)
11.6.3 The LYRA Surveillance Radar
268(1)
11.6.4 The Multifunctional Console
269(1)
11.7 The Validating Experiment
270(1)
11.8 Conclusions
271(2)
About the Authors 273 (8)
Index 281
Giorgio Franceschetti is a full professor at the University Federico II, Napoli, Italy, an adjunct professor at UCLA, and a distinguished visiting scientist at JPL. Dr. Franceschetti is the author/editor of several books and has published over 160 scientific papers in peer-reviewed journals of recognised standards. He earned his Ph.D. in electronic and telecommunications engineering at the University of Rome. Marina Grossi is chief executive officer of SELEX Sistemi Integrati, a Finmeccanica company, a leader in defence electronics and air traffic control systems.