Cover image for Critical information infrastructures : resilience and protection
Title:
Critical information infrastructures : resilience and protection
Personal Author:
Publication Information:
New York : Springer, 2007
Physical Description:
xi, 277 p. ; 24 cm.
ISBN:
9780387718613
General Note:
Available in online version
Added Title:
Critical Information Infrastructures [electronic resource]: Resilience and Protection
Electronic Access:
Fulltext
DSP_RESTRICTION_NOTE:
Remote access restricted to users with a valid UTM ID via VPN

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010177470 QA76.9.A25 H97 2007 Open Access Book Book
Searching...

On Order

Summary

Summary

Resilience is an increasingly important concept and quality in today's world. It is particularly important in the area of Critical Infrastructures. It is crucial in the area of Critical Information Infrastructure. This is because, since the year 2000, man has been dependent on information and telecommunications systems for survival, particularly in the Organization for Economic Cooperation and Development (OECD) countries, and because all other Critical Inf- structures depend upon, to a greater or lesser extent, Critical Information 1,2 Infrastructure. Until, probably, the late 1980s it would be fair to say that the defense of individual nation states depended upon a mixture of political will and armed might. The fall of the Berlin Wall may have effectively ended the Cold War, and with it a bipolar world, but it brought globalization and a multipolar digital world in its wake. Simply put, a number of power vacuums were created and these have yet to be fully filled and settled. In this "New World" many changes were afoot. These changes include the increasing irrelevance of nation states in federated structures and the export of democracy on the back of globalization. One of the biggest changes, though, is the use of digital technolo gy by the OECD countries. This is on such a scale that these countries have become both dependent upon information technology and as individual 3 states largely irrelevant to the new "global" electronic economy. 1 This adaptation of Maslow's hierarchy of needs is attributed to KPMG.


Table of Contents

Chapter 1 Introductionp. 1
Chapter 2 Definitions and Assumptionsp. 8
Chapter 3 Critical Infrastructures and Critical Information Infrastructures: Approaches by Geographyp. 19
Chapter 4 Critical Infrastructures and Critical Information Infrastructures: by Typep. 45
Chapter 5 Critical Information Infrastructurep. 61
Chapter 6 Some Political, Economic, Social, Technological, Environmental, Legal and Other Process Effects on Critical Infrastructuresp. 77
Chapter 7 Comments on Standards in Information Security, Disaster Recovery, Business Continuity and Business Resiliencep. 94
Chapter 8 A Tangential Threat To OECD Resilience: The Twenty-First Century East India Companyp. 145
Chapter 9 Resilience and Outsourcing Call Centers Offshore: A Case Studyp. 150
Chapter 10 Information Infrastructure: Resilience, Recovery, and Securityp. 158
Chapter 11 A Suggested Approach to Individual, Corporate, National, and International Resilience, Critical Infrastructures, and Critical Information Infrastructuresp. 176
Chapter 12 General Summary and Conclusionsp. 194
Chapter 13 A Manifesto for Changep. 198
Appendix
1 Introductionp. 201
2 Bibliographies/Lists/Directories/Surveys/Search Enginesp. 202
3 Books - Arranged Alphabetically by Subjectp. 206
Apachep. 206
Auditing and Securityp. 206
Backup (In Terms of Backing Up Data on Computers)p. 206
Carnivorep. 206
Certification for Security Professionalsp. 207
CISCOp. 209
Code (As In Computer Code)p. 209
Computer Securityp. 209
Corporate Securityp. 209
Crime/Forensics/Malice/Malwarep. 210
Critical Infrastructurep. 211
Cryptographyp. 211
Data/Databases and Related Issuesp. 212
Data Mining (The Process of Searching Data for Specific Information)p. 213
Disaster Recovery and Contingency Planning (Relevant To Technology)p. 213
eBusinessp. 215
Firewallsp. 215
Hackingp. 216
Hardeningp. 217
Javap. 219
Kerberosp. 220
Linuxp. 220
Microsoft and Microsoft Windows Generalp. 220
Mobile Communications/Mobilityp. 221
.NETp. 221
Network Securityp. 221
Operational Riskp. 223
Public Key Infrastructure (PKI)p. 223
Positive Messagesp. 223
Reliabilityp. 223
Radio Frequency Identification (RFID)p. 223
Securing and Securityp. 223
Sniffingp. 226
Spamp. 226
Steganographyp. 226
Virtual Private Networks (VPNs)p. 227
Warfare and Politicsp. 227
Wirelessp. 228
WordPerfectp. 228
4 Articles - Arranged Alphabetically By Subjectp. 228
Asymmetric Warfarep. 229
Bankingp. 229
BS7799p. 229
Critical Infrastructurep. 229
Cryptographyp. 229
Computer Crime and Securityp. 230
Cyberwar and Netwarp. 230
Clash of Civilizationsp. 230
Data Relatedp. 230
Defensep. 230
Digital Developmentp. 230
Dot Com Dreamsp. 230
Electionsp. 230
Electronic Intrusionp. 230
Electronic Mailp. 231
Electronic Signaturep. 231
Erlangp. 231
Environmentp. 231
Freedom of Informationp. 231
Fuel Crisisp. 232
Information Security and Warfare, etc.p. 232
Javap. 232
Microsoft and Ciscop. 233
National Information Infrastructurep. 233
Network Securityp. 233
Optimistic Message Loggingp. 233
Open Systemsp. 233
Obstructive Marketingp. 233
Resilience, Robustness, Reliabilityp. 233
Radio Frequency Identification (RFID)p. 234
Security, etc.p. 234
Strategic Information Warfarep. 235
Telecommunications Networksp. 235
URL (Uniform or Universal Resource Locator - Web Address) Securityp. 235
Utilitiesp. 235
Video Codingp. 236
Wire Piratesp. 236
Year 2000 Issues (Y2K)p. 236
5 Regular Publications - Arranged Alphabetically By Titlep. 236
6 Links - Arranged Alphabetically by Subject and Site Namep. 239
Academiap. 239
Associations/Institutes/Societies/Organizations, etcp. 241
Asymmetric and Information Warfarep. 243
Australiap. 244
Austriap. 244
Canadap. 245
Finlandp. 246
Francep. 247
Germanyp. 247
International Organizationsp. 249
Italyp. 250
Lawyersp. 250
Policep. 250
The Netherlandsp. 251
New Zealandp. 252
Norwayp. 252
Russiap. 253
Swedenp. 253
Switzerlandp. 253
United Kingdomp. 255
United Statesp. 256
Vendor Sitesp. 258
General Information - Alphabetically by Sitep. 261
Indexp. 267