Description |
1 online resource (x, 244 pages) : illustrations |
Series |
Terrorism, hot spots and conflict-related issues |
|
Terrorism, hot spots and conflict-related issues.
|
Contents |
1.3.2. The Value Proposition1.4. THREATS TO THE NATION'S CI/KR; 1.4.1. The Vulnerability of the U.S. Infrastructureto 21st Century Threats; 1.4.2. The Nature of Possible Terrorist Attacks; 1.5. ALL-HAZARDS AND CI/KR PROTECTION; 1.6. PLANNING ASSUMPTIONS; 1.6.1. Sector-Specific Nature of CI/KR Protection; 1.6.2. Cross-Sector Dependencies and Interdependencies; 1.6.3. Adaptive Nature of the Terrorist Threat; 1.6.4. All-Hazards Nature of CI/KR Protection; 1.7. SPECIAL CONSIDERATIONS; 1.7.1 Protection of Sensitive Information; 1.7.2. The Cyber Dimension; 1.7.3. The Human Element |
|
1.7.4. International CI/KR Protection1.8. ACHIEVING THE GOAL OF THE NIPP; 1.8.1. Understanding and Sharing Information; 1.8.2. Building Security Partnerships; 1.8.3. Implementing a Long-Term CI/KR Risk Management Program; 1.8.4. Maximizing Efficient Use of Resources for CI/KR Protection; 2. AUTHORITIES, ROLES, ANDRESPONSIBILITIES; 2.1. AUTHORITIES; 2.2. ROLES AND RESPONSIBILITIES; 2.2.1. Department of Homeland Security; 2.2.2. Sector-Specific Agencies; 2.2.3. Other Federal Departments, Agencies, and Offices; 2.2.4. State, Local, and Tribal Governments |
|
2.2.5. Private Sector Owners and Operators2.2.6. Advisory Councils; 2.2.7. Academia and Research Centers; 3. THE PROTECTION PROGRAM STRATEGY:MANAGING RISK; 3.1. SET SECURITY GOALS; 3.2. IDENTIFY ASSETS, SYSTEMS, NETWORKS, AND FUNCTIONS; 3.2.1. National Infrastructure Inventory; 3.2.2. Protecting and Accessing Inventory Information; 3.2.3. SSA Roles in Inventory Development and Maintenance; 3.2.4. State Roles in Inventory Development and Maintenance; 3.2.5. Identifying Cyber Infrastructure; 3.2.6. Identifying Positioning, Navigation, and Timing Services; 3.3. ASSESS RISKS |
|
3.3.1. NIPP Baseline Criteria for Assessment Methodologies3.3.2. Consequence Analysis; 3.3.3. Vulnerability Assessment; 3.3.4. Threat Analysis; 3.4. PRIORITIZE; 3.4.1. The Prioritization Process; 3.4.2. Tailoring Prioritization Approaches to Sector Needs; 3.4.3. The Uses of Prioritization; 3.5. IMPLEMENT PROTECTIVE PROGRAMS; 3.5.1. Protective Actions; 3.5.2. Characteristics of Effective Protective Programs; 3.5.3. Protective Programs, Initiatives, and Reports; 3.6. MEASURE EFFECTIVENESS; 3.6.1. NIPP Metrics and Measures; 3.6.2. Gathering Performance Information |
Summary |
Annotation Protecting the critical infrastructure and key resources (CI/KR) of the United States is essential to the Nations security, public health and safety, economic vitality, and way of life. Attacks on CI/KR could significantly disrupt the functioning of government and business alike and produce cascading effects far beyond the targeted sector and physical location of the incident. Direct terrorist attacks and natural, manmade, or technological hazards could produce catastrophic losses in terms of human casualties, property destruction, and economic effects, as well as profound damage to public morale and confidence. Attacks using components of the Nations CI/KR as weapons of mass destruction could have even more devastating physical and psychological consequences |
Notes |
"The National Infrastructure Protection Plan (NIPP) provides the unifying structure for the integration of critical infrastructure and key resources (CI/KR) protection into a single national program."--Letter of agreement |
|
Includes index |
Bibliography |
Includes bibliographical references (pages 228-230) and index |
Notes |
Print version record |
Subject |
Terrorism -- United States -- Prevention
|
|
Civil defense -- United States.
|
|
National security -- United States.
|
|
Preparedness.
|
|
POLITICAL SCIENCE -- Political Freedom & Security -- Terrorism.
|
|
Civil defense
|
|
National security
|
|
Preparedness
|
|
Terrorism -- Prevention
|
|
United States
|
Form |
Electronic book
|
Author |
Lupul, Frederick H.
|
ISBN |
9781614703440 |
|
1614703442 |
|