Description |
1 online resource (xvi, 272 pages) : illustrations. |
|
text file |
Series |
Homeland security studies. Critical infrastructure and homeland security series ;
10.
|
|
Homeland security series (Lanham, Md.)
|
Bibliography |
Includes bibliographical references and index. |
Contents |
Machine generated contents note: 1. Introduction -- We Feel It Because of a Need; It Is the Need to Communicate -- Sector Overview -- The Bottom Line -- References and Recommended Reading -- 2. Terrorist Attacks Against Americans -- Introduction -- What Is Terrorism? -- References and Recommended Reading -- 3. Critical Infrastructure -- What Is Critical Infrastructure? -- Wireline Infrastructure -- Wireless Infrastructure -- Satellite Infrastructure -- Cable Infrastructure -- Broadcasting Infrastructure -- The Bottom Line -- References and Recommended Reading -- 4. Communications Sector Security -- Mr. Grasshopper and Mr. Rabbit #1 -- Introduction -- Communications Sector Security Goals and Attributes -- Homeland Security Directives -- Assessing Consequences -- References and Recommended Reading -- 5. Vulnerability Assessment (VA) -- Introduction -- Assessing Vulnerabilities -- Mr. Grasshopper and Mr. Rabbit Conversation #2 -- Insider Threat Vulnerability -- Vulnerability Assessment (VA) -- Vulnerability Assessment Methodology -- Vulnerability Assessment Procedures -- Vulnerability Assessment: Checklist Procedure -- References and Recommended Reading -- 6. Preparation: When Is Enough, Enough? -- Introduction -- Threats and Incidents -- Response to Threats -- Preparation -- The Bottom Line -- References and Recommended Reading -- 7. Cybersecurity and SCADA -- Cyberspace -- What Is SCADA? -- SCADA Applications -- SCADA Vulnerabilities -- Steps to Improve SCADA Security -- References and Recommended Reading -- 8. Emergency Response -- Communications Sector Contingency Planning -- Crisis Communications Plan -- The Bottom Line -- References and Recommended Reading -- 9. Security Techniques and Hardware -- The Multiple-Barrier Approach -- Security Hardware Devices -- Communication Integration -- Cyber Protection Devices -- References and Recommended Reading -- 10. The Paradigm Shift -- Fourteen Features of Active and Effective Security -- References and Recommended Reading. |
Summary |
"The tenth of a new, well-received, and highly acclaimed series on critical infrastructure and homeland security, Communications Sector Protection and Homeland Security is an eye-opening account and an important reference source of a complex sector"--Provided by publisher. |
Local Note |
eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America |
Subject |
Telecommunication -- Security measures -- United States.
|
|
Telecommunication -- Security measures. |
|
United States. |
|
National security -- United States.
|
|
National security. |
|
Telecommunication policy -- United States.
|
|
Telecommunication policy. |
|
BUSINESS & ECONOMICS / Industries / Media & Communications. |
|
TECHNOLOGY & ENGINEERING / Telecommunications. |
Genre/Form |
Electronic books.
|
Other Form: |
Print version: Spellman, Frank R., author. Communications sector protection and homeland security Lanham, Maryland : Bernan Press, an imprint of The Rowman & Littlefield Publishing Group, Inc., [2018] 9781641433099 (DLC) 2018035516 |
ISBN |
9781641433105 (electronic book) |
|
1641433108 (electronic book) |
|
9781641433099 (paperback) |
|