Cyber-physical security : protecting critical infrastructure at the state and local level /: protecting critical infrastructure at the state and local level. ([2016])
- Record Type:
- Book
- Title:
- Cyber-physical security : protecting critical infrastructure at the state and local level /: protecting critical infrastructure at the state and local level. ([2016])
- Main Title:
- Cyber-physical security : protecting critical infrastructure at the state and local level
- Further Information:
- Note: Robert M. Clark, Simon Hakim, editors.
- Editors:
- Clark, Robert M
Hakim, Simon, 1944- - Contents:
- Contributors; 1 Protecting Critical Infrastructure at the State, Provincial, and Local Level: Issues in Cyber-Physical Security; Abstract; 1.1 Introduction; 1.2 Cyber Security Challenges; 1.2.1 US Federal Information Security Responsibilities as Established in Law and Policy; 1.2.2 Evolution of US Federal Strategy; 1.3 Activities of the US National Governors Association; 1.4 US Cyber-Security Research; 1.5 International Studies and Research on Cyber-Physical Security; 1.6 Summary and Conclusions; References; 2 Cybersecurity Terminology and Frameworks; Abstract; 2.1 Introduction. 2.2 Terminology2.2.1 Core Terminology; 2.2.2 Scope; 2.2.3 Assets; 2.2.4 Confidentiality; 2.2.5 Integrity; 2.2.6 Availability; 2.3 Risk Assessment Terminology; 2.3.1 Threats; 2.3.1.1 Threats from People; 2.3.1.2 Threats from Other Sources; 2.3.2 Vulnerabilities; 2.3.3 Probability; 2.3.4 Impact; 2.4 Risk Treatment Terminology; 2.4.1 Risk Acceptance; 2.4.2 Risk Avoidance; 2.4.3 Risk Treatment/Risk Mitigation; 2.4.4 Risk Transfer; 2.5 Controls Terminology; 2.5.1 Controls Overview; 2.5.1.1 Types of Controls; 2.5.2 ISO 27001/ISO 27002. 2.6 Requirements of the ISO 27001 Information Security Management System2.6.1 Context; 2.6.2 Interested Parties; 2.6.3 Leadership and Commitment; 2.6.4 Policy; 2.6.5 Organizational Roles, Responsibilities, and Authorities; 2.6.6 Planning; 2.6.6.1 Actions to Address Risks and Opportunities; 2.6.6.2 Information Security Risk Assessment; 2.6.6.3 Information Security RiskContributors; 1 Protecting Critical Infrastructure at the State, Provincial, and Local Level: Issues in Cyber-Physical Security; Abstract; 1.1 Introduction; 1.2 Cyber Security Challenges; 1.2.1 US Federal Information Security Responsibilities as Established in Law and Policy; 1.2.2 Evolution of US Federal Strategy; 1.3 Activities of the US National Governors Association; 1.4 US Cyber-Security Research; 1.5 International Studies and Research on Cyber-Physical Security; 1.6 Summary and Conclusions; References; 2 Cybersecurity Terminology and Frameworks; Abstract; 2.1 Introduction. 2.2 Terminology2.2.1 Core Terminology; 2.2.2 Scope; 2.2.3 Assets; 2.2.4 Confidentiality; 2.2.5 Integrity; 2.2.6 Availability; 2.3 Risk Assessment Terminology; 2.3.1 Threats; 2.3.1.1 Threats from People; 2.3.1.2 Threats from Other Sources; 2.3.2 Vulnerabilities; 2.3.3 Probability; 2.3.4 Impact; 2.4 Risk Treatment Terminology; 2.4.1 Risk Acceptance; 2.4.2 Risk Avoidance; 2.4.3 Risk Treatment/Risk Mitigation; 2.4.4 Risk Transfer; 2.5 Controls Terminology; 2.5.1 Controls Overview; 2.5.1.1 Types of Controls; 2.5.2 ISO 27001/ISO 27002. 2.6 Requirements of the ISO 27001 Information Security Management System2.6.1 Context; 2.6.2 Interested Parties; 2.6.3 Leadership and Commitment; 2.6.4 Policy; 2.6.5 Organizational Roles, Responsibilities, and Authorities; 2.6.6 Planning; 2.6.6.1 Actions to Address Risks and Opportunities; 2.6.6.2 Information Security Risk Assessment; 2.6.6.3 Information Security Risk Treatment; 2.6.6.4 Information Security Objectives and Planning to Achieve Them; 2.6.7 Support; 2.6.7.1 Competence; 2.6.7.2 Awareness; 2.6.7.3 Communication; 2.6.7.4 Documented Information; 2.6.8 Operation. 2.6.8.1 Operational Planning and Control2.6.8.2 Information Security Risk Assessment; 2.6.8.3 Information Security Risk Treatment; 2.6.9 Performance Evaluation; 2.6.9.1 Monitoring, Measurement, Analysis, and Evaluation; 2.6.9.2 Internal Audit; 2.6.9.3 Management Review; 2.6.10 Improvement; 2.6.10.1 Nonconformity and Corrective Action; 2.6.10.2 Continual Improvement; 2.7 NIST Computer Security Resource Center; 2.8 NIST Framework for Improving Critical Infrastructure Cybersecurity; 2.8.1 Framework Core; 2.8.1.1 Core Functions; 2.8.1.2 Identify; 2.8.1.3 Protect; 2.8.1.4 Detect; 2.8.1.5 Respond. 2.8.1.6 Recover2.8.2 Framework Profile; 2.8.3 Implementation Tiers; 2.9 NIST Special Publication 800-82-Guide to Industrial Control Systems (ICS) Security; 2.9.1 Administrative or Directive Controls; 2.9.2 Preventive Controls; 2.9.3 Detective Controls; 2.9.4 Corrective Controls; 2.10 Comparison of Controls; 2.11 Summary and Conclusions; References; 3 Assessing Cyber Threats and Solutions for Municipalities; Abstract; 3.1 Introduction; 3.2 Cyberspace as Critical Infrastructure; 3.3 Threats to the Physical Plant and Information Technology; 3.3.1 The Physical Plant. … (more)
- Publisher Details:
- Switzerland : Springer
- Publication Date:
- 2016
- Copyright Date:
- 2017
- Extent:
- 1 online resource
- Subjects:
- 005.8
Political science
Cyberinfrastructure -- Security measures
COMPUTERS -- Security -- General
Technology & Engineering -- Environmental -- General
Technology & Engineering -- Power Resources -- General
Water supply & treatment
Power generation & distribution
Environmental pollution
Political Science -- General
Political science & theory
Electronic books - Languages:
- English
- ISBNs:
- 9783319328249
3319328247 - Related ISBNs:
- 9783319328225
- Notes:
- Note: Includes bibliographical references.
Note: Online resource; title from PDF title page (EBSCO, viewed August 18, 2016). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.363093
- Ingest File:
- 01_328.xml