Understanding, Assessing, and Responding to Terrorism: Protecting Critical Infrastructure and Personnel

Передняя обложка
John Wiley & Sons, 10 апр. 2007 г. - Всего страниц: 466

Preparedness is the best weapon against terrorism

Understanding, Assessing, and Responding to Terrorism: Protecting Critical Infrastructure and Personnel gives a detailed explanation of how to implement preventive and/or protective measures to ensure the safety of personnel and facilities. It includes:

  • Easily customized templates for the vulnerability analysis, security procedures, emergency response procedures, and training programs

  • Vulnerability assessment methodologies and formulas for prioritizing targets

  • Coverage of critical infrastructure sectors, hard targets, and soft targets, such as hotels, places of worship, and commercial districts

  • Countermeasures for terrorist attacks using weapons of mass destruction with coverage of chemical, biological, radiological/nuclear, and explosive materials

  • A seven-step Security Vulnerability Analysis (SVA) process to identify and categorize critical infrastructure, key resources, and key assets

  • Information on the National Incident Management System (NIMS) that enables all public, private, and non-governmental organizations to work together effectively to prepare for, prevent, respond to, and recover from domestic incidents

  • Numerous case studies and examples

A practical, how-to book with step-by-step processes to help reduce risks from terrorist attacks, this is a must-have reference for private and public sector risk managers, safety engineers, security professionals, facility managers, emergency responders, and others charged with protecting facilities and personnel.

Результаты поиска по книге

Избранные страницы

Содержание

The Terrorist Threat
1
12 Terrorism Statistics
2
14 Goal of Terrorism
3
Economic Effects of a Terrorist Attack
4
17 The Terrorism Challenge
5
19 The Motivation for Terrorism
20
111 Types of Terrorist
23
112 Historical Terrorist Attacks
26
66 Probability of Attack Occurrence
225
67 Consequences of a Successful Attack
226
69 The Carver Assessment Tool
244
References
250
Appendix 61 Homeland Security Presidential Directive 3 by President George Bush
251
Protecting Critical Infrastructure Key Resources and Key Assets
255
73 Preparing to Conduct a Security Vulnerability Analysis
259
74 The Security Vulnerability Analysis Process
260

113 International Terrorism
27
114 Examples of International Terrorist Groups
31
115 Terrorist Groups that Claimed Responsibility for Terrorist Attacks in 2004
36
116 Recent International Terrorist Groups
38
117 Domestic Terrorism
44
118 Examples of Domestic Terrorist Groups
46
119 Recent Domestic Terrorist Attacks
48
References
50
Critical Infrastructure
51
23 Current Definition of Critical Infrastructure
53
24 Definition of Key Resources
54
27 Soft Targets
62
29 Cascading Effects from Interdependencies of Critical Infrastructures
63
210 Coordination of Critical Infrastructure Protection
64
211 Selection of Critical Infrastructure and Key Assets
67
212 Identification and Selection of Soft Targets by a Jurisdiction
68
213 Inventorying and Prioritizing Critical InfrastructureKey ResourcesKey AssetsSoft Targets
69
References
83
Appendix 21 Executive Order 13010 by President William J Clinton
84
Appendix 22 Presidential Decision Directive 63 by President William J Clinton
88
Appendix 23 Executive Order 13228 by President George W Bush
100
Appendix 24 Executive Order 13231 by President George W Bush
106
Appendix 25 Homeland Security Presidential Directive 7 by President George W Bush
115
Types of Terrorist Attacks
123
32 Types of Destructive Events
124
34 Ways in Which an Asset May Be Attacked
125
35 Target Selection
126
36 Identifying Lucrative Targets
127
37 Difference Between Terrorism and Insurgency
128
38 Characteristics of a Terrorist Attacks
129
39 Results of a Terrorist Attack
130
310 Terrorist Tactics
131
311 Case Study of a Terrorist Attack
138
312 The Interrupted Terrorist Plots
139
References
141
Weapons of Mass Destruction
143
42 History of Weapons of Mass Destruction
144
43 Why Use a Weapon of Mass Destruction?
145
44 Limitations of the Use of Weapon of Mass Destruction Materials
146
45 Indicators of a Possible Weapon of a Mass Destruction Attack
147
47 How a Chemical Biological or Radiological Agent Can Enter the Body
149
48 Questions About Weapons of Mass Destruction
150
49 Types of Weapons of Mass Destruction
152
410 Weaponization of Chemical and Biological Agents
183
References
191
The Terrorists Preparation for an Attack
193
53 The Terrorists Investments
194
54 Example of Terrorist Financing
195
55 Eight Indicators of Terrorism
196
56 Raising Suspicion
211
57 Summary of Attack Process
212
References
213
Risk and Threat Assessment
215
63 The Risk of Attack
217
65 Threats
219
75 Administrative Functions in Security Vulnerability Analysis Process
268
76 Risk Assessment
273
77 Preparing to Conduct a Threat and Risk Analysis
274
78 The Buffer Zone Protection Plan BZPP
282
79 The Carver Target Analysis Tools
284
Reference
287
Principles of Protective Security
289
83 Information Collection
290
86 CostBenefit Analysis
291
87 Situational Awareness
292
88 Security
295
89 Suspicious Activity
299
810 What Can be Done to Protect People and Facilities
300
811 Conclusion
309
References
310
Effective Security Countermeasures
311
National Security Strategy
312
95 Management of Change
317
97 Critical Infrastructure Resiliency
318
98 Critical Infrastructure Protection
320
99 All Hazards Protection
322
911 Information Sharing and Analysis Centers
323
913 Protecting Critical Infrastructure Key Resources and Key Assets
324
914 Administrative Security Enhancements
329
915 Recommendations for Enhanced Security Through Various ISACs
348
References
360
Appendix 91 Homeland Security Presidential Directive 8 by President George W Bush
361
General Emergency Response Considerations
367
103 Emergency Response Plans
368
104 PreEmergency Plans
369
105 Drills and Exercises
370
106 Emergency Response Priorities
372
107 Operational Risk Management
374
108 Situational Awareness
376
109 Homeland Security Presidential Directive 5 HSPD 5
377
1010 Homeland Security Presidential DirectiveNational Preparedness
383
1011 The Incident Command System
384
1012 Determining Potential Outcomes
391
1014 Developing a Plan of Action
393
1015 Requirements for the Incident Command System
395
1016 Evaluating Progress of the Plan of Action
412
1017 Terminating the Incident
413
1018 Critical Incident Stress
416
1019 Family Preparedness
417
Reference
418
Appendix 101 Homeland Security Presidential Directive 5 by President George W Bush
419
Emergency Response to a Weapon of Mass Destruction Attack
425
112 Use of a Weapon of Mass Destruction
426
114 Size Up
427
116 Evacuation of Personnel in a Weapon Mass Destruction Attack
429
117 Protecting building Environments from Airborne Agents
431
118 Emergency Response Actions at the Scene of a Weapon of Mass Destruction Incident
432
Index
461
Авторские права

Другие издания - Просмотреть все

Часто встречающиеся слова и выражения

Об авторе (2007)

Brian T. Bennett, PhD. has more than twenty years of experience in dealing with health and safety, emergency response, and security/counterterrorism issues in both the chemical manufacturing industry as well as in the community as a volunteer firefighter and emergency management official. He holds numerous professional certifications, including Certified in Homeland Security (CHS), Certified Safety Professional (CSP), and Certified Hazardous Materials Manager (CHMM). He is Chair of the New Jersey Domestic Security Task Force Infrastructure Advisory Committee for the chemical sector. Dr. Bennett is a certified Firefighter, Fire Official, Fire Officer, Fire Instructor, Hazardous Materials Specialist, and Weapons of Mass Destruction Technician. He has written and lectured extensively on combating terrorism.

Библиографические данные