Understanding, Assessing, and Responding to Terrorism: Protecting Critical Infrastructure and PersonnelJohn Wiley & Sons, 10 апр. 2007 г. - Всего страниц: 466 Preparedness is the best weapon against terrorism Understanding, Assessing, and Responding to Terrorism: Protecting Critical Infrastructure and Personnel gives a detailed explanation of how to implement preventive and/or protective measures to ensure the safety of personnel and facilities. It includes:
A practical, how-to book with step-by-step processes to help reduce risks from terrorist attacks, this is a must-have reference for private and public sector risk managers, safety engineers, security professionals, facility managers, emergency responders, and others charged with protecting facilities and personnel. |
Содержание
The Terrorist Threat | 1 |
12 Terrorism Statistics | 2 |
14 Goal of Terrorism | 3 |
Economic Effects of a Terrorist Attack | 4 |
17 The Terrorism Challenge | 5 |
19 The Motivation for Terrorism | 20 |
111 Types of Terrorist | 23 |
112 Historical Terrorist Attacks | 26 |
66 Probability of Attack Occurrence | 225 |
67 Consequences of a Successful Attack | 226 |
69 The Carver Assessment Tool | 244 |
References | 250 |
Appendix 61 Homeland Security Presidential Directive 3 by President George Bush | 251 |
Protecting Critical Infrastructure Key Resources and Key Assets | 255 |
73 Preparing to Conduct a Security Vulnerability Analysis | 259 |
74 The Security Vulnerability Analysis Process | 260 |
113 International Terrorism | 27 |
114 Examples of International Terrorist Groups | 31 |
115 Terrorist Groups that Claimed Responsibility for Terrorist Attacks in 2004 | 36 |
116 Recent International Terrorist Groups | 38 |
117 Domestic Terrorism | 44 |
118 Examples of Domestic Terrorist Groups | 46 |
119 Recent Domestic Terrorist Attacks | 48 |
References | 50 |
Critical Infrastructure | 51 |
23 Current Definition of Critical Infrastructure | 53 |
24 Definition of Key Resources | 54 |
27 Soft Targets | 62 |
29 Cascading Effects from Interdependencies of Critical Infrastructures | 63 |
210 Coordination of Critical Infrastructure Protection | 64 |
211 Selection of Critical Infrastructure and Key Assets | 67 |
212 Identification and Selection of Soft Targets by a Jurisdiction | 68 |
213 Inventorying and Prioritizing Critical InfrastructureKey ResourcesKey AssetsSoft Targets | 69 |
References | 83 |
Appendix 21 Executive Order 13010 by President William J Clinton | 84 |
Appendix 22 Presidential Decision Directive 63 by President William J Clinton | 88 |
Appendix 23 Executive Order 13228 by President George W Bush | 100 |
Appendix 24 Executive Order 13231 by President George W Bush | 106 |
Appendix 25 Homeland Security Presidential Directive 7 by President George W Bush | 115 |
Types of Terrorist Attacks | 123 |
32 Types of Destructive Events | 124 |
34 Ways in Which an Asset May Be Attacked | 125 |
35 Target Selection | 126 |
36 Identifying Lucrative Targets | 127 |
37 Difference Between Terrorism and Insurgency | 128 |
38 Characteristics of a Terrorist Attacks | 129 |
39 Results of a Terrorist Attack | 130 |
310 Terrorist Tactics | 131 |
311 Case Study of a Terrorist Attack | 138 |
312 The Interrupted Terrorist Plots | 139 |
References | 141 |
Weapons of Mass Destruction | 143 |
42 History of Weapons of Mass Destruction | 144 |
43 Why Use a Weapon of Mass Destruction? | 145 |
44 Limitations of the Use of Weapon of Mass Destruction Materials | 146 |
45 Indicators of a Possible Weapon of a Mass Destruction Attack | 147 |
47 How a Chemical Biological or Radiological Agent Can Enter the Body | 149 |
48 Questions About Weapons of Mass Destruction | 150 |
49 Types of Weapons of Mass Destruction | 152 |
410 Weaponization of Chemical and Biological Agents | 183 |
References | 191 |
The Terrorists Preparation for an Attack | 193 |
53 The Terrorists Investments | 194 |
54 Example of Terrorist Financing | 195 |
55 Eight Indicators of Terrorism | 196 |
56 Raising Suspicion | 211 |
57 Summary of Attack Process | 212 |
References | 213 |
Risk and Threat Assessment | 215 |
63 The Risk of Attack | 217 |
65 Threats | 219 |
75 Administrative Functions in Security Vulnerability Analysis Process | 268 |
76 Risk Assessment | 273 |
77 Preparing to Conduct a Threat and Risk Analysis | 274 |
78 The Buffer Zone Protection Plan BZPP | 282 |
79 The Carver Target Analysis Tools | 284 |
Reference | 287 |
Principles of Protective Security | 289 |
83 Information Collection | 290 |
86 CostBenefit Analysis | 291 |
87 Situational Awareness | 292 |
88 Security | 295 |
89 Suspicious Activity | 299 |
810 What Can be Done to Protect People and Facilities | 300 |
811 Conclusion | 309 |
References | 310 |
Effective Security Countermeasures | 311 |
National Security Strategy | 312 |
95 Management of Change | 317 |
97 Critical Infrastructure Resiliency | 318 |
98 Critical Infrastructure Protection | 320 |
99 All Hazards Protection | 322 |
911 Information Sharing and Analysis Centers | 323 |
913 Protecting Critical Infrastructure Key Resources and Key Assets | 324 |
914 Administrative Security Enhancements | 329 |
915 Recommendations for Enhanced Security Through Various ISACs | 348 |
References | 360 |
Appendix 91 Homeland Security Presidential Directive 8 by President George W Bush | 361 |
General Emergency Response Considerations | 367 |
103 Emergency Response Plans | 368 |
104 PreEmergency Plans | 369 |
105 Drills and Exercises | 370 |
106 Emergency Response Priorities | 372 |
107 Operational Risk Management | 374 |
108 Situational Awareness | 376 |
109 Homeland Security Presidential Directive 5 HSPD 5 | 377 |
1010 Homeland Security Presidential DirectiveNational Preparedness | 383 |
1011 The Incident Command System | 384 |
1012 Determining Potential Outcomes | 391 |
1014 Developing a Plan of Action | 393 |
1015 Requirements for the Incident Command System | 395 |
1016 Evaluating Progress of the Plan of Action | 412 |
1017 Terminating the Incident | 413 |
1018 Critical Incident Stress | 416 |
1019 Family Preparedness | 417 |
Reference | 418 |
Appendix 101 Homeland Security Presidential Directive 5 by President George W Bush | 419 |
Emergency Response to a Weapon of Mass Destruction Attack | 425 |
112 Use of a Weapon of Mass Destruction | 426 |
114 Size Up | 427 |
116 Evacuation of Personnel in a Weapon Mass Destruction Attack | 429 |
117 Protecting building Environments from Airborne Agents | 431 |
118 Emergency Response Actions at the Scene of a Weapon of Mass Destruction Incident | 432 |
461 | |
Другие издания - Просмотреть все
Understanding, Assessing, and Responding to Terrorism: Protecting Critical ... Brian P. Bennett Ограниченный просмотр - 2007 |
Understanding, Assessing, and Responding to Terrorism: Protecting Critical ... Brian P. Bennett Недоступно для просмотра - 2007 |