Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- System Effects and Hardening (3)
- Homeland Security (2)
- Infrastructure Modeling (2)
- Infrastructure Protection (2)
- System Vulnerabilities (2)
-
- Counterterrorism (1)
- Critical Infrastructure Protection (1)
- Cyber Security (1)
- Disaster Planning (1)
- EMI/EMC Protection (1)
- EMP Commission (1)
- Education (1)
- Electric Power Resilience (1)
- Emergency Response (1)
- Information Warfare (1)
- Infrastructure Assurance (1)
- Infrastructure Interdependencies (1)
- Intentional EMI (1)
- Probabilistic Risk Assessment (1)
- Process Control Systems (1)
- SCADA (1)
- Vulnerability Assessment (1)
Articles 1 - 5 of 5
Full-Text Articles in Engineering
Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham
Report Of The Commission To Assess The Threat To The United States From Emp Attack: Critical National Infrastructures, William R. Graham
George H Baker
The physical and social fabric of the United States is sustained by a system of systems; a complex and dynamic network of interlocking and interdependent infrastructures (“critical national infrastructures”) whose harmonious functioning enables the myriad actions, transactions, and information flow that undergird the orderly conduct of civil society in this country. The vulnerability of these frastructures to threats — deliberate, accidental, and acts of nature — is the focus of greatly heightened concern in the current era, a process accelerated by the events of 9/11 and recent hurricanes, including Katrina and Rita. This report presents the results of the Commission’s …
Electric Power: Cyber And Electromagnetic Security Issues, George H. Baker
Electric Power: Cyber And Electromagnetic Security Issues, George H. Baker
George H Baker
Electric power is essential to the functioning of U.S. society. The electric power system increasingly operates at or near its reliability limits. The geographic scale of the tightly coupled networks involved makes the system susceptible to large-scale outages. More frequent natural and accidental failures portend possible catastrophes from intentional disruption. Deregulation has been a major factor to the lack of investment in system upgrades. Techniques to prevent attacks and reduce vulnerabilities are available and affordable.
Homeland Security: Engaging The Frontlines - Symposium Proceedings, George H. Baker, Cheryl J. Elliott
Homeland Security: Engaging The Frontlines - Symposium Proceedings, George H. Baker, Cheryl J. Elliott
George H Baker
The rise of the American homeland security endeavor under the leadership of the new Department of Homeland Security has been heralded by several major national strategy documents. These documents have served to organize efforts at top levels within the government and industry. However, the national strategy guidance is not getting to many organizations and people at the grass-roots level who can make the most difference in preventing attacks, protecting systems, and recovering from catastrophic events, viz. the general citizenry, private infrastructure owners, and local governments. To better understand grass-roots issues and solutions, James Madison University, in cooperation with the Federal …
Network Security Risk Assessment Modeling Tools For Critical Infrastructure Assessment, George H. Baker, Samuel Redwine, Joseph Blandino
Network Security Risk Assessment Modeling Tools For Critical Infrastructure Assessment, George H. Baker, Samuel Redwine, Joseph Blandino
George H Baker
The James Madison University (JMU) CIPP research team is developing Network Security Risk Assessment Modeling (NSRAM) tools that will enable the assessment of both cyber and physical infrastructure security risks. The effort is driven by the need to predict and compute the probability of adverse effects stemming from system attacks and malfunctions, to understand their consequences, and to improve existing systems to minimize these consequences.
The tools are targeted at systems supporting critical infrastructures varying from individual systems to organization-wide systems, to systems covering entire geographical regions. Early work emphasizes computing systems, but systems sharing the network nature of computing …
Supervisory Control And Data Acquisition (Scada) Systems, George H. Baker, Allan Berg
Supervisory Control And Data Acquisition (Scada) Systems, George H. Baker, Allan Berg
George H Baker
Our critical national infrastructure systems have become almost universally dependent upon computer-based control systems technically referred to as supervisory control and data acquisition (SCADA) systems. SCADA systems evolved from the telemetry and event-alarm systems developed in the early days of utilities. With the widespread use of SCADA systems, computers have become the "basis element" for much of our critical infrastructure. Thus, the disruption of controlling computer terminals and networks due to natural disasters, electric power failure, accidents or malicious activity can have catastrophic consequences.