Critical Infrastructure System Security and Resiliency, 1st Edition

  • Betty Biringer
  • Published By: CRC Press
  • ISBN-10: 1466557516
  • ISBN-13: 9781466557512
  • DDC: 363.325
  • Grade Level Range: College Freshman - College Senior
  • 232 Pages | eBook
  • Original Copyright 2013 | Published/Released December 2015
  • This publication's content originally published in print form: 2013

  • Price:  Sign in for price



Security protections for critical infrastructure nodes are intended to minimize the risks resulting from an initiating event, whether it is an intentional malevolent act or a natural hazard. With an emphasis on protecting an infrastructure's ability to perform its mission or function, Critical Infrastructure System Security and Resiliency presents a practical methodology for developing an effective protection system that can either prevent undesired events or mitigate the consequences of such events.

Developed at Sandia National Labs, the authors' analytical approach and methodology enables decision-makers and security experts to perform and utilize risk assessments in a manner that extends beyond the theoretical to practical application. These protocols leverage expertise in modeling dependencies—optimizing system resiliency for effective physical protection system design and consequence mitigation.

The book begins by focusing on the design of protection strategies to enhance the robustness of the infrastructure components. The authors present risk assessment tools and necessary metrics to offer guidance to decision-makers in applying sometimes limited resources to reduce risk and ensure operational resiliency.

Our critical infrastructure is vast and made up of many component parts. In many cases, it may not be practical or affordable to secure every infrastructure node. For years, experts—as a part of the risk assessment process—have tried to better identify and distinguish higher from lower risks through risk segmentation. In the second section of the book, the authors present examples to distinguish between high and low risks and corresponding protection measures. In some cases, protection measures do not prevent undesired events from occurring.

Table of Contents

Front Cover.
Half Title Page.
Title page.
Copyright Page.
List of Figures.
List of Tables.
About the Authors.
Acronyms and Abbreviations.
Security Risk Assessment.
1: Introduction to Security Risk Assessment.
2: Undesired Events, Associated Critical Assets, and Available Resources.
3: Threat Analysis.
4: Likelihood of Initiating Events.
5: Assess Consequences and Responses for Undesired Event.
6: Assessment of Protection System Effectiveness.
7: Estimate Security Risk.
Evaluation and Design of Resilient Systems.
8: Motivating Infrastructure Resilience Analysis.
9: Current State of Resilience Assessment.
10: Infrastructure Resilience Analysis Methodology.
11: Case Studies Using the Infrastructure Resilience Analysis Framework.
12: Future Directions.
Appendix A: Example Use of Fault Trees to Identify Critical Assets.
Appendix B: Physical Protection Features Performance Data.