What people are saying - Write a review
We haven't found any reviews in the usual places.
According Accounting actions activities addition administrators agencies allow analysis applications areas associated assurance attacks authentication authorized changes chemical communications computer systems configuration connected continue coordinate critical infrastructure protection critical infrastructure sectors cyber attacks cybersecurity technologies Department designed detection determine devices effective efforts encryption enforcement ensure entities established example federal government Figure files filter firewalls functions Homeland Security host identify implementation important improve increase individual industry information technology Institute integrity Internet intrusion Issues logs methods monitoring Office operating operating systems organizations packet patches perform physical potential practices prevent private sector problems programs Protocol requirements response risk scanners server sharing signature Source specific standards Strategy Table threats tokens traffic types typically vulnerabilities Washington
Page 131 - Critical infrastructures are those physical and cyber-based systems essential to the minimum operations of the economy and government. They include, but are not limited to, telecommunications, energy, banking and finance, transportation, water systems and emergency services, both governmental and private.
Page 136 - States; (2) recommending measures to protect the key resources and critical infrastructure of the United States in coordination with other federal agencies and in cooperation with state and local government agencies and authorities, the private sector, and other entities...
Page 136 - It provides direction to the federal government departments and agencies that have a role in homeland security. It suggests steps that state and local governments, private companies and organizations, and individual Americans can take to improve our security and offers incentives for them to do so.
Page 38 - As NIPC reports, the effects of a swarming attack include slowing or complicating the response to a physical attack. For instance, a cyber attack that disabled the water supply or the electrical system, in conjunction with a physical attack, could deny emergency services the necessary resources to manage the consequences of the physical attack — such as controlling fires, coordinating response, and generating light.
Page 132 - President Bush signed Executive Order 13231, establishing the President's Critical Infrastructure Protection Board to coordinate cyber-related federal efforts and programs associated with protecting our nation's critical infrastructures. The Special Advisor to the President for Cyberspace Security chairs the board.
Page 21 - December 1 7, 2003, which directs the establishment of "a national policy for Federal departments and agencies to identify and prioritize United States critical infrastructure and key resources and to protect them from terrorist attacks.
Page 18 - Agency Comments We provided a draft of this report to the Department of Commerce for its review and comment.
Page 28 - I've not been able to verify it. For more and better information, see Enos(1993). 2. "9/11" refers to the terrorist attacks on the World Trade Center in New York City and the Pentagon in Washington, DC, on September 11, 2001.
Page 7 - Internet, are revolutionizing the way our government, our nation, and much of the world communicate and conduct business. The benefits have been enormous. Vast amounts of information are now literally at our fingertips, facilitating research on virtually every topic imaginable; financial and other business transactions can be executed almost instantaneously, often on a 24-hour-a-day basis; and electronic mail.
Page 102 - ... Sector-Specific Agencies shall: (a) collaborate with all relevant Federal departments and agencies, State and local governments, and the private sector, including with key persons and entities in their infrastructure sector; (b) conduct or facilitate vulnerability assessments of the sector; and (c) encourage risk management strategies to protect against and mitigate the effects of attacks against critical infrastructure and key resources. (20) Nothing in this directive alters, or impedes the...