Communications Sector Protection and Homeland Security

Communications Sector Protection and Homeland Security

by Frank R. Spellman
ISBN-10:
1641433094
ISBN-13:
9781641433099
Pub. Date:
10/31/2018
Publisher:
Bernan Press
ISBN-10:
1641433094
ISBN-13:
9781641433099
Pub. Date:
10/31/2018
Publisher:
Bernan Press
Communications Sector Protection and Homeland Security

Communications Sector Protection and Homeland Security

by Frank R. Spellman
$120.0
Current price is , Original price is $120.0. You
$120.00 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores

Overview

The tenth of a new, well-received, and highly acclaimed series on critical infrastructure and homeland security, Communications Sector Protection and Homeland Security is an eye-opening account and an important reference source of a complex sector.

Communications systems are the backbone for much of the critical infrastructure within the United States and many of the other infrastructure components are completely dependent on them to perform their missions. They serve part in parcel with other key national security and emergency preparedness resources. This book examines the importance that the communication sector has in relation to national security policy and on issues of homeland security.


Product Details

ISBN-13: 9781641433099
Publisher: Bernan Press
Publication date: 10/31/2018
Series: Homeland Security Series
Pages: 288
Product dimensions: 6.06(w) x 8.98(h) x 0.64(d)

About the Author

Frank R. Spellman is the author or co-author of more than 70 books on safety, occupational health, and natural and environmental sciences. He has 45 years of experience in safety and health and has served as a consultant for the U.S. Department of Justice, a variety of law firms, and a number of non-governmental organizations on environmental issues and health-related matters. He is formerly an assistant professor of environmental health at Old Dominion University.

Table of Contents

Acronyms and Abbreviations xi

Preface xiii

Prologue-No Calls in the Wild 1

1 Introduction 11

We Feel It Because of a Need; It Is the Need to Communicate 11

Sector Overview 13

The Bottom Line 18

References and Recommended Reading 18

2 Terrorist Attacks Against Americans 19

Introduction 19

What Is Terrorism? 27

References and Recommended Reading 39

3 Critical Infrastructure 41

What Is Critical Infrastructure? 41

Wireline Infrastructure 44

Wireless Infrastructure 50

Satellite Infrastructure 51

Cable Infrastructure 52

Broadcasting Infrastructure 52

The Bottom Line 53

References and Recommended Reading 54

4 Communications Sector Security 55

Mr. Grasshopper and Mr. Rabbit #1 56

Introduction 56

Communications Sector Security Goals and Attributes 57

Homeland Security Directives 59

Assessing Consequences 59

References and Recommended Reading 63

5 Vulnerability Assessment (VA) 65

Introduction 65

Assessing Vulnerabilities 66

Mr. Grasshopper and Mr. Rabbit Conversation #2 68

Insider Threat Vulnerability 69

Vulnerability Assessment (VA) 75

Vulnerability Assessment Methodology 84

Vulnerability Assessment Procedures 91

Vulnerability Assessment: Checklist Procedure 94

References and Recommended Reading 95

6 Preparation: When Is Enough, Enough? 97

Introduction 98

Threats and Incidents 98

Response to Threats 100

Preparation 102

The Bottom Line 107

References and Recommended Reading 107

7 Cybersecurity and SCADA 109

Cyberspace 112

What Is SCADA? 118

SCADA Applications 120

SCADA Vulnerabilities 122

Steps to Improve SCADA Security 130

References and Recommended Reading 138

8 Emergency Response 141

Communications Sector Contingency Planning 143

Crisis Communications Plan 144

The Bottom Line 153

References and Recommended Reading 153

9 Security Techniques and Hardware 155

The Multiple-Barrier Approach 155

Security Hardware Devices 161

Communication Integration 213

Cyber Protection Devices 217

References and Recommended Reading 221

10 The Paradigm Shift 223

Fourteen Features of Active and Effective Security 224

References and Recommended Reading 235

Glossary 237

Index 259

About the Author 271

From the B&N Reads Blog

Customer Reviews