ISBN-13: 9781394179527 / Angielski
ISBN-13: 9781394179527 / Angielski
PrefaceTHE CHALLENGE 21. The Evolution of Critical Infrastructure Protection 31.1. In the Beginning 41.2. Natural Disaster Recovery 71.3. What is Critical? 111.4. Public-private Cooperation 151.5. Federalism: Whole of government 172. Defining CIKR Risk and Resilience 202.1. Risk Strategy 232.2. Resilience Strategy 252.3. Sustainability Strategy 282.4. The Four Horsemen 313. Weather/Climate Change/Global Warming 323.1. The Carrington Event 343.2. Black Bodies 363.3. The Lightening Rod 384. Consequences 394.1. Accidents/Aging/Neglect 404.2. The Report Card 424.2.1. The Domino Effect 424.3. Terrorism/Extremists 434.4. Cyber Exploits/Criminals 474.4.1. Black Hats 484.4.2. Cybercrime Pays 494.5. The Soft War 514.6. Cyberattacks and CIKR 535. Discussion 55WHAT IS A CATASTROPHE? 21. Theories of Collapse 41.1. Normal Accident Theory (NAT) 51.2. Punctuated Equilibrium Theory (PET) 71.3. How Uncertain are Avalanches? 82.4. Self-organized Criticality 102. Complex Systems Theory 122.1 Tragedy of the Commons (TOC) 132.2. Paradox of Enrichment (POE) 172.3. Competitive Exclusion Principle (CEP) 212.4. Paradox of Redundancy (POR) 253. General Systems Theory 273.1. Emergence 273.2. Self-Organization 283.3. Preferential Attachment 294. Vulnerable Industrial Commons 304.1. TOC Failure 324.2. POE Failure 324.3. CEP Failure 334.4. POR Failure 345. Resilience vs. Sustainability 345.1. Black Swans 355.2. Catastrophe's Long Tail 366. Discussion 37ENERGY TRANSITION 21. A Sector Under Transition 22.1. Understanding Units and Measures 62.2. Consumption 73. Regulatory Structure of the Energy Sector 93.1. Evolution of Energy Sector Regulation 93.2. Energy Pipeline Regulations 103.3. The Energy ISAC 124. Legacy Fuels 134.1. Coal 134.2. The Rise of Oil and the Automobile 144.3. Natural Gas Middlemen 164.4. Nuclear Fuel 185. Legacy Energy Infrastructure 215.1. Oil Refineries 225.2. Oil Transmission and Distribution 245.3. Oil Storage 255.4. The Natural Gas Supply Chain 285.1. Critical Refineries 305.2. Critical Transmission Pipelines 316. Renewables 336.1. Solar - Photovoltaic (PV) 336.2. Wind 346.3. The Hydrogen Circle 366.4. Others 397. Batteries and Reservoirs 407.1. Modern Batteries 417.2. Grid Scale Storage - LDES 428. Discussion 43THE VULNERABLE POWERGRID 11. What is the Grid? 52. The North American Grid 82.1. Grid Structure 102.2. ACE and Kirchhoff's Law 132.3. Anatomy of a Blackout 143. Threat Analysis 193.1. Attack Scenario 1: Disruption of fuel supply to power plants 193.2. Attack Scenario 2: Destruction of major transformers 203.3. Attack Scenario 3: Disruption of SCADA communications 233.4 Attack Scenario 4: Creation of a cascading transmission failure 244. From Death Rays to Vertical Integration 264.1. Early Regulation 294.2. Deregulation and EPACT 1992 324.3. Energy Sector ISAC 345. Out of Orders 888 and 889 Comes Chaos 375.1. Economics Versus Physics 415.2. What Increases SOC? 445.3. A Change of Heart 486. The Architecture of 21st Century Grids 496.1. The Future is Storage 516.2. SOC is Reduced 546.3. Economics of Electrification 577. Discussion 60WATER AND WATER TREATMENT 21. A Vanishing Resource 21.1. From Germs to Terrorists 51.2. Safe Drinking Water Act 61.3. The WaterISAC 82. Foundations: SDWA of 1974 93. The Bio-terrorism Act of 2002 113.1. Is Water for Drinking? 123.2. Climate Change and Rot - the New Threats 154. The Architecture of Water Systems 184.1. The Law of the River 204.2. Resiliency of Water Pipeline Networks 215. Hetch Hetchy Water 235.1. Risk Analysis 265.2. Resilience Analysis 266. Threat Analysis 276.1. The Rational Actor 286.2. Hetch Hetchy Threat Analysis 296.3. Chem-Bio 306.4. Earthquakes 327. Water Resilience 337.1. Save the Pineapple Express 347.2. Grey Water 367.3. Desalination 377.4. Exemplar Israel 388. Discussion 39TRANSPORTATION RENEWED 21. Transitioning a Vast and Complex Sector 21.1. Government Leads the Way 41.2. Safety and Security 52. Roads at TOC Risk 82.1. The Road to Prosperity 132.2. Economic Impact 142.3. The National Highway System (NHS) 162.4. The Interstate Highway Network is Resilient 182.5. The NHS is Safer 192.6. The Future is Electric 213. Rail and Railroads 223.1. Birth of Regulation 253.2. Freight Trains 293.3. Passenger Rail 303.4. Terrorist Target Passenger Trains 323.5. Economics of Rail 344. Air Transportation 364.1. Resilience of the Hub-and-Spoke Network 414.2. Security of Commercial Air Travel 434.3. How Safe and Secure is Flying in the US? 474.4. Drones 484.5. eVTOLs 494.6. Commercial Airline Impact on Global Warming 495. Discussion 50SUPPLY CHAINS 11. The World Is Flat, But Tilted 71.1. Supply Side Supply 101.2. The Father of Containerization 111.3. The Perils of Efficient Supply Chains 132. The World Trade Web 182.1. WTW and Economic Contagions 192.2. Resilience Failures 213. TWIC 253.1. MSRAM 263.2. PROTECT 304. Sustainable and Resilient Supply Chains 315. Are Supply Chains Secure? 335.1. Encapsulation Works 355.2. Who Owns the Trusted Path? 366. Discussion 37COMMUNICATIONS AND THE INTERNET 21. Early Years 51.1. The Natural Monopoly 91.2. The Communications Act of 1996 122. Regulatory Structure 142.1. The Most Important Person in Modern History 152.2. The First (Modern) Critical Infrastructure 163. The Architecture of the Communications Sector 213.1. Physical Infrastructure 213.2. Wireless Networks 243.3. Extra-terrestrial Communication 263.4. Land Earth Stations 303.5. Cellular Networks 313.6. Cell Phone Generations 343.7. Wi-Fi Technology 354. Risk and Resilience Analysis 374.1. Importance of Carrier Hotels 394.2. The Submarine Cable Network 414.3. HPM Threats 434.4. Cellular Network Threats 454.5. Physical Threats 495. The Monoculture Internet 495.1. The Internet Self-organized 525.2. The Original Sins 555.2.1. The DNS 585.2.2. More Original Sin 605.3. The Hierarchical Internet 625.4. Too Many Open Ports 656. Internet Governance 666.1. IAB and IETF 676.2. ICANN Wars 716.3. ISOC 746.4. W3C 756.5. Internationalization 776.6. Regulation and Balkanization 796.6.1. Rise of Regulation 816.6.2. Criticality of the Internet 837. Green Communications 847.1. Solar Computing 847.2. Quantum Communications 857.3. Adiabatic Logic 868. Discussion 87CYBER THREATS 11. Threat surface 81.1. Script-kiddies 141.2. Black Hats 161.3. Weaponized Exploits 161.4. Ransomware and the NSA 192. Basic Vulnerabilities 222.1. The First Exploit 252.2. TCP/IP Flaws 292.3. Open Ports 332.4. Buffer Overflow Exploits 352.5. DDoS Attacks 372.6. Email Exploits 382.7. Flawed Application and System Software 392.8. Trojans, Worms, Viruses, and Keyloggers 422.9. Hacking the DNS 442.10. Hardware Flaws 462.11. Botnets 493. Cyber Risk Analysis 523.1. Kill Chain Approach 533.2. Machine-learning Approach 554. Analysis 575. Discussion 59SOCIAL HACKING 11. Web 2.0 and the Social Network 52. Social Networks Amplify Memes 103. Topology Matters 134. Computational Propaganda 155. Beware the Echo Chamber 186. Big Data Analytics 206.1. Algorithmic Bias 236.2. The Depths of Deep Learning 246.3. Data Brokers 257. GDPR 268. Social Network Resilience 309. The Sustainable Web 329.1. The Century of Regulation 339.2. The NetzDG 3410. Discussion 37BANKING AND FINANCE 21. The Financial System 101.1. Federal Reserve vs. US Treasury 121.2. Operating the System 131.3. Balancing the Balance Sheet 151.4. Paradox of Enrichment 182. Financial Networks 192.1. FedWire 202.2. TARGET 222.3. SWIFT 242.4. Credit Card Networks 262.5. 3-D Secure Payment 273. Virtual Currency 293.1. Intermediary PayPal 303.2. ApplePay 313.3. Cryptocurrency 323.3.1. Nakamoto's Revenge 343.3.2. Double Spend Problem 353.3.3. Crypto Challenges 394. Hacking a Financial Network 435. Hot Money 455.1. Liquidity Traps 465.2. The Dutch Disease 496. The End of Stimulus? 517. Fractal Markets 527.1. Efficient Market Hypothesis (EMH) 537.2. Fractal Market Hypothesis (FMH) 557.3. Predicting Collapse 568. The Threat is Existential 589. Discussion 59STRATEGIES FOR A CHANGING WORLD 11. Whole of Government 52. Risk and Resilience 83. Complex and Emergent CIKR 123.1. Communications and IT 133.2. Internet and Cybersecurity 154. Surveillance Capitalism 175. Industrial Control Systems 196. Global Pandemics 227. Transportation and Supply Chains 238. Banking and Finance 259. Discussion
Ted G. Lewis is an author, speaker, and computer scientist with expertise in applied complexity theory, homeland security, infrastructure systems, and early-stage startup strategies. He is a member of the Oregon State University Engineering Hall of Fame and has held high-ranking positions in government, industry, and academia over his lengthy career.
1997-2025 DolnySlask.com Agencja Internetowa