دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش:
نویسندگان: Drew Spaniel
سری:
ISBN (شابک) : 1032152087, 9781032152080
ناشر: CRC Press
سال نشر: 2022
تعداد صفحات: 312
[314]
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 7 Mb
در صورت تبدیل فایل کتاب Securing the Nation's Critical Infrastructures: A Guide for the 2021–2025 Administration به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب ایمن سازی زیرساخت های حیاتی کشور: راهنمایی برای دولت 2021-2025 نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
به دولت آینده و اعضای جوامع زیرساختی حیاتی کمک می کند تا امنیت سایبری را در اولویت قرار دهند، با تهدیدات نوظهور مبارزه کنند، خط مشی های معناداری ایجاد کنند، و نوسازی و فناوری های نوپا را در نظر بگیرند. ICIT انتظار دارد که مخاطبان نشریه شامل خوانندگان فنی و عمومی در زیرساخت های حیاتی، دولت فدرال و عموم مردم باشند. این راهنما به گونهای طراحی شده است که هفده بخش زیرساختی حیاتی را بهعنوان فصلهای مجزا که شامل چندین مقاله ۲۰۰۰ تا ۴۰۰۰ کلمهای هستند، نشان دهد.
Helps the incoming administration and members of critical infrastructure communities prioritize cybersecurity, combat emerging threats, craft meaningful policy, and consider modernization and nascent technologies. ICIT expects the audience of the publication to include technical and general readers in the critical infrastructures, federal government, and general public. The guide is designed to feature the seventeen critical infrastructure sectors as individual chapters that contain multiple 2,000 - 4,000-word essays.
Cover Half Title Title Page Copyright Page Contents Foreword Acknowledgments Chapter 1: Chemical 1.0. About the Chemical Sector 1.1. ICS Security in the Chemical Sector—beyond CFATS Chapter 2: Commercial Facilities 2.0. About the Commercial Facilities Sector 2.1. Digital Supply Chain Security: What Happens When an Organization’s Trusted Solutions Can No Longer Be Trusted? Chapter 3: Communications 3.0. About the Communications Sector 3.1. Accelerating Intelligence to Action 3.2. Zero Trust for Critical Infrastructure Requires a New Focus on Secure Communications Chapter 4: Critical Manufacturing 4.0. About the Critical Manufacturing Sector 4.1. Transitioning Critical Manufacturing to Cyber Resiliency Chapter 5: Dams 5.0. About the Dams Sector 5.1. Under-funding Dam Sector Cybersecurity Leads to a Flood of Threats Chapter 6: Defense Industrial Base 6.0. About the Defense Industrial Base 6.1. Accelerating DIB Cyber Security and Information Sharing Transformation 6.2. What Is CMMC and Why Is It Important Chapter 7: Election 7.0. About Election Security: Perspectives on Past, Present, and Future US Political Campaigns 7.1. Action Plan for More Secure Campaigns—Addressing the Gaping Hole in Our Electoral Process 7.2. Preparing for the Future of Election Security—Recommendations for the 46th President 7.3. The Race with No Finish Line: Securing the Next Election in the Wake of 2020 7.4. The State of Campaign Cybersecurity 7.5. The Price of Liberty—Countering Long-Term Malicious Cyber Influences on Democratic Processes Chapter 8: Emergency Services 8.0. About the Emergency Services Sector 8.1. Case Study—Law Enforcement Digital Forensics and Investigations Review; Results of a Cybersecurity Workforce Readiness Survey Chapter 9: Energy 9.0. About the Energy Sector 9.1. Securing the Backbone of the US Critical Infrastructure Chapter 10: Financial Services 10.0. About the Financial Services Sector 10.1. Time for Financial Providers to Lead with Cybersecurity 10.2. Public-Private Partnership in Fighting the Cyber Threat Chapter 11: Food and Agriculture 11.0. About the Food and Agriculture Sector 11.1. For CPG Companies, a Zero Trust Security Strategy Is the Best Supply Chain Defense 11.2. Software Helps Feed America—How Do We Keep It Secure? 11.3. Trust in the Food and Agriculture Supply Chain Starts in the Dirt and Ends on Our Tables Chapter 12: Government Facilities 12.0. About the Government Facilities Sector 12.1. Zero Trust: Buzzword or Panacea? 12.2. Outdated and Left Behind: Improving and Innovating Our Government Facilities 12.3. Recommendations for Securing Government Facilities Chapter 13: Healthcare and Public Health 13.0. About the Healthcare and Public Health Sector 13.1. How to Navigate a New Era of Threats to the Healthcare Sector 13.2. Direct Patient Care Subsector Cybersecurity State of the Union Chapter 14: Information Technology 14.0. About the Information Technology Sector 14.1. Cybersecurity and Zero Outage: Where CISOs and Mission Leaders Align 14.2. Managing Global Supply Chains and Their Impact on US Critical Infrastructure: What Do Critical Infrastructure Sectors Need to Do, Now and in the Future? Chapter 15: Nuclear Sector 15.0. About the Nuclear Reactors, Material, and Waste Sector 15.1. “Security by Isolation” Inhibits Nuclear Sector Resilience and Potential Chapter 16: Local and State Government 16.0. About State and Local Government Cybersecurity 16.1. Emerging Threats and Challenges Facing State and Local Governments and Why They Should Be Considered Critical Infrastructure 16.2. Innovations for State and Local Governments 16.3. Recommendations to Improve the Cyber Resilience of State and Local Governments Chapter 17: Transportation 17.0. About the Transportation Sector 17.1. From the Ground, through the Air, and Beyond Out There: Over the Horizon Opportunities, Risks, and Challenges in the Transportation System Sector Chapter 18: Water and Wastewater Management 18.0. About the Water and Wastewater Systems Sector 18.1. Florida Water Treatment Attack and the Implications for Critical Infrastructure and Cybersecurity—An Exegesis 18.2. Adhering to 12-Stage Process for Achieving Cyber Secured Water and Sewage Operations Closing Conclusion Afterword: Some Things Change, Some Things Stay the Same Index