Cyber-Physical Security

Protecting Critical Infrastructure at the State and Local Level

Nonfiction, Science & Nature, Technology, Environmental, Power Resources, Social & Cultural Studies, Political Science
Cover of the book Cyber-Physical Security by , Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: ISBN: 9783319328249
Publisher: Springer International Publishing Publication: August 10, 2016
Imprint: Springer Language: English
Author:
ISBN: 9783319328249
Publisher: Springer International Publishing
Publication: August 10, 2016
Imprint: Springer
Language: English

This book focuses on the vulnerabilities of state and local services to cyber-threats and suggests possible protective action that might be taken against such threats. Cyber-threats to U.S. critical infrastructure are of growing concern to policymakers, managers and consumers. Information and communications technology (ICT) is ubiquitous and many ICT devices and other components are interdependent; therefore, disruption of one component may have a negative, cascading effect on others.  Cyber-attacks might include denial of service, theft or manipulation of data.  Damage to critical infrastructure through a cyber-based attack could have a significant impact on the national security, the economy, and the livelihood and safety of many individual citizens.  Traditionally cyber security has generally been viewed as being focused on higher level threats such as those against the internet or the Federal government.  Little attention has been paid to cyber-security at the state and local level.  However, these governmental units play a critical role in providing services to local residents and consequently are highly vulnerable to cyber-threats. The failure of these services, such as waste water collection and water supply, transportation, public safety, utility services, and communication services, would pose a great threat to the public.  Featuring contributions from leading experts in the field, this volume is intended for state and local government officials and managers, state and Federal officials, academics, and public policy specialists.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book focuses on the vulnerabilities of state and local services to cyber-threats and suggests possible protective action that might be taken against such threats. Cyber-threats to U.S. critical infrastructure are of growing concern to policymakers, managers and consumers. Information and communications technology (ICT) is ubiquitous and many ICT devices and other components are interdependent; therefore, disruption of one component may have a negative, cascading effect on others.  Cyber-attacks might include denial of service, theft or manipulation of data.  Damage to critical infrastructure through a cyber-based attack could have a significant impact on the national security, the economy, and the livelihood and safety of many individual citizens.  Traditionally cyber security has generally been viewed as being focused on higher level threats such as those against the internet or the Federal government.  Little attention has been paid to cyber-security at the state and local level.  However, these governmental units play a critical role in providing services to local residents and consequently are highly vulnerable to cyber-threats. The failure of these services, such as waste water collection and water supply, transportation, public safety, utility services, and communication services, would pose a great threat to the public.  Featuring contributions from leading experts in the field, this volume is intended for state and local government officials and managers, state and Federal officials, academics, and public policy specialists.

More books from Springer International Publishing

Cover of the book Governmental Forms and Economic Development by
Cover of the book Empowering Users through Design by
Cover of the book From the Paris Agreement to a Low-Carbon Bretton Woods by
Cover of the book Archean Rare-Metal Pegmatites in Zimbabwe and Western Australia by
Cover of the book New Directions in the Philosophy of Science by
Cover of the book Mathematical Modeling of Biological Processes by
Cover of the book Friction Stir Welding and Processing IX by
Cover of the book Jacobi Forms, Finite Quadratic Modules and Weil Representations over Number Fields by
Cover of the book Stagnation Versus Growth in Europe by
Cover of the book Weird IR by
Cover of the book The Relevance of Academic Work in Comparative Perspective by
Cover of the book Innovations in Technologies for Fermented Food and Beverage Industries by
Cover of the book Understanding Relational and Group Experiences through the Mmogo-Method® by
Cover of the book Innovations Lead to Economic Crises by
Cover of the book Applications of Evolutionary Computation in Image Processing and Pattern Recognition by
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy