Understanding, Assessing, and Responding to Terrorism : Protecting Critical Infrastructure and Personnel

個数:

Understanding, Assessing, and Responding to Terrorism : Protecting Critical Infrastructure and Personnel

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 466 p.
  • 言語 ENG
  • 商品コード 9780471771524
  • DDC分類 363.325170973

Full Description

Preparedness is the best weapon against terrorism
Understanding, Assessing, and Responding to Terrorism: Protecting Critical Infrastructure and Personnel gives a detailed explanation of how to implement preventive and/or protective measures to ensure the safety of personnel and facilities. It includes:



Easily customized templates for the vulnerability analysis, security procedures, emergency response procedures, and training programs
Vulnerability assessment methodologies and formulas for prioritizing targets
Coverage of critical infrastructure sectors, hard targets, and soft targets, such as hotels, places of worship, and commercial districts
Countermeasures for terrorist attacks using weapons of mass destruction with coverage of chemical, biological, radiological/nuclear, and explosive materials
A seven-step Security Vulnerability Analysis (SVA) process to identify and categorize critical infrastructure, key resources, and key assets
Information on the National Incident Management System (NIMS) that enables all public, private, and non-governmental organizations to work together effectively to prepare for, prevent, respond to, and recover from domestic incidents
Numerous case studies and examples


A practical, how-to book with step-by-step processes to help reduce risks from terrorist attacks, this is a must-have reference for private and public sector risk managers, safety engineers, security professionals, facility managers, emergency responders, and others charged with protecting facilities and personnel.

Contents

Preface xiii


1. The Terrorist Threat 1


1.1 What Is Terrorism? 1


1.2 Terrorism Statistics 2


1.3 Purpose of Terrorism 2


1.4 Goals of Terrorism 3


1.5 Case Study: Economic Effects of a Terrorist Attack 4


1.6 Objectives of Terrorism 4


1.7 The Terrorism Challenge 5


1.8 What is Homeland Security? 5


1.9 The Motivation for Terrorism 20


1.10 Common Terms in Terrorism 20


1.11 Types of Terrorists 23


1.12 Historical Terrorist Attacks 26


1.13 International Terrorism 27


1.14 Examples of International Terrorist Groups 31


1.15 Terrorist Groups that Claimed Responsibility for Terrorist Attacks in 2004 36


1.16 Recent International Terrorist Attacks 38


1.17 Domestic Terrorism 44


1.18 Examples of Domestic Terrorist Groups 46


1.19 Recent Domestic Terrorist Attacks 48


References 50


2. Critical Infrastructure 51


2.1 Introduction 51


2.2 Evolution of the Definition of Critical Infrastructure 51


2.3 Current Definition of Critical Infrastructure 53


2.4 Definition of Key Resources 54


2.5 Definition of Key Assets 54


2.6 Discussion of Critical Infrastructure 54


2.7 Soft Targets 62


2.8 Hard Targets 62


2.9 Cascading Effects from Interdependencies of Critical Infrastructures 63


2.10 Coordination of Critical Infrastructure Protection 64


2.11 Selection of Critical Infrastructure and Key Assets 67


2.12 Identification and Selection of Soft Targets by a Jurisdiction 68


2.13 Inventorying and Prioritizing Critical Infrastructure/Key Resources/Key Assets/Soft Targets 69


References 83


Appendix 2.1 Executive Order 13010 by President William J. Clinton 84


Appendix 2.2 Presidential Decision Directive 63 by President William J. Clinton 88


Appendix 2.3 Executive Order 13228 by President George W. Bush 100


Appendix 2.4 Executive Order 13231 by President George W. Bush 106


Appendix 2.5 Homeland Security Presidential Directive 7 by President George W. Bush 115


3. Types of Terrorist Attacks 123


3.1 Introduction 123


3.2 Types of Destructive Events 124


3.3 Who Can Execute an Attack? 124


3.4 Ways in Which an Asset May be Attacked 125


3.5 Target Selection 126


3.6 Identifying Lucrative Targets 127


3.7 Difference between Terrorism and Insurgency 128


3.8 Characteristics of a Terrorist Attack 129


3.9 Results of a Terrorist Attack 130


3.10 Terrorist Tactics 131


3.11 Case Study of a Terrorist Attack 138


3.12 The Interrupted Terrorist Plots 139


References 141


4. Weapons of Mass Destruction 143


4.1 Introduction 143


4.2 History of Weapons of Mass Destruction 144


4.3 Why Use a Weapon of Mass Destruction? 145


4.4 Limitations of the Use of Weapon of Mass Destruction Materials 146


4.5 Indicators of a Possible Weapon of Mass Destruction Attack 147


4.6 Results of a Weapon of Mass Destruction Attack 147


4.7 How a Chemical, Biological, or Radiological Agent Can Enter the Body 149


4.8 Questions About Weapons of Mass Destruction 150


4.9 Types of Weapons of Mass Destruction 152


4.10 Weaponization of Chemical and Biological Agents 183


References 191


5. The Terrorist s Preparation for an Attack 193


5.1 General 193


5.2 Target Considerations 193


5.3 The Terrorist s Investment 194


5.4 Example of Terrorist Financing 195


5.5 Eight Indicators of Terrorism 196


5.6 Raising Suspicion 211


5.7 Summary of Attack Process 212


References 213


6. Risk and Threat Assessment 215


6.1 Introduction 215


6.2 Definitions 215


6.3 The Risk of Attack 217


6.4 Determining Key Asset and Its Value 217


6.5 Threats 219


6.6 Probability of Attack Occurrence 225


6.7 Consequences of a Successful Attack 226


6.8 Risk 226


6.9 The CARVER Assessment Tool 244


References 250


Appendix 6.1 Homeland Security Presidential Directive 3 by President George W. Bush 251


7. Protecting Critical Infrastructure, Key Resources, and Key Assets 255


7.1 Introduction 255


7.2 Purpose of Security Vulnerability Analysis (SVA) 255


7.3 Preparing to Conduct a Security Vulnerability Analysis 259


7.4 The Security Vulnerability Analysis Process 260


7.5 Administrative Functions in Security Vulnerability Analysis Process 268


7.6 Risk Assessment 273


7.7 Preparing to Conduct a Threat and Risk Analysis 274


7.8 The Buffer Zone Protection Plan (BZPP) 282


7.9 The CARVER Target Analysis Tool 284


Reference 287


8. Principles of Protective Security 289


8.1 Introduction 289


8.2 Prevention 289


8.3 Information Collection 290


8.4 Information Sharing 290


8.5 Risk Mitigation 290


8.6 Cost Benefit Analysis 291


8.7 Situational Awareness 292


8.8 Security 295


8.9 Suspicious Activity 299


8.10 What Can be Done to Protect People and Facilities 300


8.11 Conclusion 309


References 310


9. Effective Security Countermeasures 311


9.1 Introduction 311


9.2 Counterterrorism Policy: National Security Strategy 312


9.3 Hardening 312


9.4 What Are Security Countermeasures? 312


9.5 Management of Change 317


9.6 Risk Management 317


9.7 Critical Infrastructure Resiliency 318


9.8 Critical Infrastructure Protection 320


9.9 All Hazards Protection 322


9.10 Cost Benefit Analysis 322


9.11 Information Sharing and Analysis Centers 323


9.12 Private Sector s Responsibility 323


9.13 Protecting Critical Infrastructure, Key Resources, and Key Assets 324


9.14 Administrative Security Enhancements 329


9.15 Recommendations for Enhanced Security Through Various ISACs 348


References 360


Appendix 9.1 Homeland Security Presidential Directive 8 by President George W. Bush 361


10. General Emergency Response Considerations 367


10.1 Introduction 367


10.2 Definition of First Responder 367


10.3 Emergency Response Plans 368


10.4 Pre-Emergency Plans 369


10.5 Drills and Exercises 370


10.6 Emergency Response Priorities 372


10.7 Operational Risk Management 374


10.8 Situational Awareness 376


10.9 Homeland Security Presidential Directive 5 (HSPD 5) 377


10.10 Homeland Security Presidential Directive 8 National Preparedness 383


10.11 The Incident Command System 384


10.12 Determining Potential Outcomes 391


10.13 Approving the Level of Personal Protective Equipment 391


10.14 Developing a Plan of Action 393


10.15 Requirements for the Incident Command System 395


10.16 Evaluating Progress of the Plan of Action 412


10.17 Terminating the Incident 413


10.18 Critical Incident Stress 416


10.19 Family Preparedness 417


Reference 418


Appendix 10.1 Homeland Security Presidential Directive 5 by President George W. Bush 419


11. Emergency Response to a Weapon of Mass Destruction Attack 425


11.1 Introduction 425


11.2 Use of a Weapon of Mass Destruction 426


11.3 The Emergency Scene as a Crime Scene 426


11.4 Size up 427


11.5 The Secondary Device 427

11.6 Evacuation of Personnel in a Weapon of Mass Destruction Attack 429


11.7 Protecting Building Environments from Airborne Agents 431


11.8 Emergency Response Actions at the Scene of a Weapon of Mass Destruction Incident 432


Index 461

最近チェックした商品