Card | Table | RUSMARC | |
Homeland security series (Lanham, Md.).
|
Annotation
"The financial services sector is critical to the economy and represents a vital component of our nation's critical infrastructure. Financial Services Sector Protection and Homeland Security provides readers with an understanding of the challenges and potential threats faced by this sector"--.
Document access rights
Network | User group | Action | ||||
---|---|---|---|---|---|---|
Finuniversity Local Network | All | |||||
Internet | Readers | |||||
Internet | Anonymous |
Table of Contents
- Cover
- Financial Services Sector Protection and Homeland Security
- Financial Services Sector Protection and Homeland Security
- Copyright page
- Contents
- Acronyms and Abbreviations
- To the Reader
- Preface
- Prologue
- No Honor among Terrorists
- *****
- Chapter 1
- Introduction
- SETTING THE STAGE
- SECTOR OVERVIEW
- SECTOR PROFILE
- THE BOTTOM LINE
- REFERENCES AND RECOMMENDED READING
- Chapter 2
- Terrorist Attacks against Americans and United States Financial Services
- WHAT IS TERRORISM?
- REFERENCES AND RECOMMENDED READING
- Chapter 3
- Critical Infrastructure
- WHAT IS CRITICAL INFRASTRUCTURE?
- CLICKS-AND-BRICKS
- THE BOTTOM LINE
- REFERENCES AND RECOMMENDED READING
- Chapter 4
- Critical Infrastructure Security and Resilience
- FINANCIAL SERVICES SECTOR SECURITY GOALS AND ATTRIBUTES
- HOMELAND SECURITY DIRECTIVES
- ASSESSING CHALLENGES
- ASSESSING CONSEQUENCES
- REFERENCES AND RECOMMENDED READING
- Chapter 5
- Vulnerability Assessment (VA)
- ASSESSING VULNERABILITIES
- INSIDER THREAT VULNERABILITY
- THE VULNERABILITY ASSESSMENT (VA)
- VULNERABILITY ASSESSMENT (VA) METHODOLOGY
- VULNERABILITY ASSESSMENT (VA) PROCEDURES
- VULNERABILITY ASSESSMENT (VA): CHECKLIST PROCEDURE
- REFERENCES AND RECOMMENDED READING
- Chapter 6
- Preparation
- THREATS AND INCIDENTS
- RESPONSE TO THREATS
- PREPARATION
- THE BOTTOM LINE
- REFERENCES AND RECOMMENDED READING
- Chapter 7
- Cybersecurity
- THE LANGUAGE OF CYBERWAR
- THE BOTTOM LINE
- REFERENCES AND RECOMMENDED READING
- Chapter 8
- Emergency Response
- FINANCIAL SERVICES SECTOR CONTINGENCY PLANNING
- CRISIS COMMUNICATIONS PLAN
- THE BOTTOM LINE
- REFERENCES AND RECOMMENDED READING
- Chapter 9
- Security Techniques and Hardware
- TELLER’S WINDOW
- THE MULTIPLE-BARRIER APPROACH
- SECURITY HARDWARE DEVICES
- COMMUNICATION INTEGRATION
- CYBER PROTECTION DEVICES
- REFERENCES AND RECOMMENDED READING
- Chapter 10
- Fourteen Features of
Active and Effective Security
- 14 FEATURES OF ACTIVE AND EFFECTIVE SECURITY
- REFERENCES AND RECOMMENDED READING
- Appendix
- Definition of Terms
- A
- B
- C
- D
- E
- F
- G
- H
- I
- J
- K
- L
- M
- N
- O
- P
- R
- S
- T
- U
- V
- W
- X
- Z
- Index
- About the Author
Usage statistics
Access count: 0
Last 30 days: 0 Detailed usage statistics |