Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Cham : Springer International Publishing
    ISBN: 9783319010922
    Language: English
    Pages: Online-Ressource (VIII, 398 p. 114 illus., 93 illus. in color, online resource)
    Series Statement: Protecting Critical Infrastructure 2
    Series Statement: SpringerLink
    Series Statement: Bücher
    Parallel Title: Druckausg. Securing water and wastewater systems
    RVK:
    Keywords: Political science ; Water pollution ; Public administration ; Environment ; Environmental sciences ; Environmental pollution ; Wasserversorgung ; Abwasser ; Sicherheit
    Abstract: Urban water and wastewater systems have an inherent vulnerability to both manmade and natural threats and disasters including droughts, earthquakes and terrorist attacks. It is well established that natural disasters including major storms, such as hurricanes and flooding, can effect water supply security and integrity. Earthquakes and terrorist attacks have many characteristics in common because they are almost impossible to predict and can cause major devastation and confusion. Terrorism is also a major threat to water security and recent attention has turned to the potential that these attacks have for disrupting urban water supplies. There is a need to introduce the related concept of Integrated Water Resources Management which emphasizes linkages between land-use change and hydrological systems, between ecosystems and human health, and between political and scientific aspects of water management. An expanded water security agenda should include a conceptual focus on vulnerability, risk, and resilience; an emphasis on threats, shocks, and tipping points; and a related emphasis on adaptive management given limited predictability. Internationally, concerns about water have often taken a different focus and there is also a growing awareness, including in the US, that water security should include issues related to quantity, climate change, and biodiversity impacts, in addition to terrorism. This presents contributions from a group of internationally recognized experts that attempt to address the four areas listed above and includes suggestions as to how to deal with related problems. It also addresses the new and potentially growing issue of cyber attacks against water and waste water infrastructure including descriptions of actual attacks, making it of interest to scholars and policy-makers concerned with protecting the water supply
    Description / Table of Contents: Direct Threats To Water and Wastewater InfrastructureRole of design basis threats in the development, design, and implementation of water security studies and improvement -- Industrial Control System (ICS) Cyber Security for Water and Waste Water Systems -- Implementing Machine Learning Algorithms for Water Quality Event Detection: Theory and Practice -- Sensor Placement Under Nodal Demand Uncertainty for Water Distribution Systems -- Waterborne Transport Modeling of Radioactivity from the Fukushima Nuclear Power Plant Incident -- Quantitatively assessing water asset reliability in the Netherlands : 15 Years of Experience -- Impact of water resource availability on growth and development -- Water Resource Planning in Peru -- Water scarcity in Asia and its long term water and border security implications for Australia -- Threats to water-related ecosystems -- Water Diversion Projects in China -- Impact of climate change on water security -- Feasibility of using satellite water tanks for protecting drinking water in urban communities in developing countries -- Integrated Total Water Management Systems -- Integrated control and detection of accidental occurrences in water distribution networks -- Plan, Prepare and Safeguard: Water Critical Infrastructure Protection in Australia -- Latvian Practices for Protecting Water and Wastewater Infrastructure -- Austrian activities in protecting critical water infrastructure.
    Note: Includes bibliographical references and index
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    New York, NY : Springer Science+Business Media, LLC
    ISBN: 9781461401896 , 9781283351935
    Language: English
    Pages: Online-Ressource , v.: digital
    Edition: Online-Ausg. Springer eBook Collection. Humanities, Social Science and Law Electronic reproduction; Available via World Wide Web
    Series Statement: Protecting Critical Infrastructure 2
    DDC: 363.6/1
    Keywords: Social sciences ; Hydraulic engineering ; Industrial management ; Political science
    Abstract: Avi Ostfeld
    Abstract: Following the events of 9/11, the Administrator of the US Environmental Protection Agency created the Water Protection Task Force (WPTF), which identified water and wastewater systems as a major area of vulnerability to deliberate attack. The WPTF suggested that there are steps that can be taken to reduce these vulnerabilities and to make it as difficult as possible for potential saboteurs to succeed. The WPTF recommended that be scrutinized with renewed vigor to secure water and wastewater systems against these possible threats. It also recommended that water and wastewater systems have a res
    Description / Table of Contents: Acknowledgement; Contents; Contributors; 1 Securing Water and Wastewater Systems: An Overview; 1.1 Introduction; 1.2 History of Water Supply Vulnerability; 1.3 Threats from Earthquakes; 1.3.1 The Loma Prieta Earthquake; 1.3.2 The Northridge Earthquake; 1.3.3 Kobe City Earthquake; 1.3.4 Technological and Institutional Adaptation; 1.3.4.1 Technological Adaptations; 1.3.4.2 Institutional Adaptations; 1.4 Vulnerable Characteristics of US Water Supply Systems; 1.5 The Threat of Terrorism to Urban Water Systems; 1.5.1 Bioterrorism and Chemical Contamination; 1.6 Countermeasures Against Terrorism
    Description / Table of Contents: 1.6.1 Physical Countermeasures1.6.2 Sensor Networks; 1.7 Cyber Security; 1.7.1 Laws and Regulations Governing the Internet; 1.7.2 Internet Recovery; 1.7.3 Examples of Internet Interruption; 1.7.3.1 Case Study -- The Slammer Worm; 1.7.3.2 Case Study -- A Root Server Attack; 1.7.3.3 Case Study -- The Baltimore Train Tunnel Fire; 1.7.3.4 Case Study -- The September 11, 2001, Terrorist Attack on the World Trade Center; 1.7.3.5 Case Study -- Hurricane Katrina; 1.7.4 Cyber Attacks in the Public Sector; 1.7.4.1 The ''Stuxnet'' Virus; 1.8 Material to Be Included in This Book
    Description / Table of Contents: 1.8.1 Current State of Water Supply and Wastewater Systems Security: An Overview1.8.2 Characteristics of Water and Wastewater Systems in the United States; 1.8.3 Chemical and Microbiological Threats for Water System Contamination; 1.8.4 Monitoring for Natural and Manmade Threats in Water and Wastewater Systems; 1.8.5 Modeling Contaminant Propagation and Contaminant Threats; 1.8.6 Case Study Applications; 1.8.7 Distribution System Modeling, SCADA Systems, Security and Surveillance Systems; 1.8.8 Institutional and Management Issues in Responding to Natural and Manmade Threats
    Description / Table of Contents: 1.8.9 Developing Techniques and Approaches for Natural and Manmade Threat Response1.9 Summary and Conclusions; References; 2 Water/Wastewater Infrastructure Security: Threats and Vulnerabilities; 2.1 Introduction; 2.2 Why Secure Water Infrastructure?; 2.3 Threats to Water Systems; 2.3.1 Evolving Threat Environment; 2.3.1.1 September 11 Terrorist Attacks; 2.3.1.2 Hurricane Katrina; 2.3.2 Threat Assessments; 2.3.3 Natural Disasters; 2.3.3.1 Human-Caused Incidents; 2.3.3.2 External Threats; 2.3.3.3 Internal Threats; 2.3.3.4 Cyber Threats; 2.3.4 Design Basis Threat
    Description / Table of Contents: 2.3.5 Continuity Threats to Workforce and Infrastructure2.3.5.1 The Dual Threat: Aging Infrastructure and Aging Workforce; 2.3.5.2 Aging Infrastructure; 2.3.5.3 Interdependent Infrastructure Failures; 2.3.5.4 Workforce Illness; 2.4 Water System Vulnerabilities; 2.4.1 Above-Ground Structures; 2.4.2 Below-Ground Structures; 2.4.3 SCADA and Cyber Systems; 2.4.4 Vulnerability Assessments; References; 3 EPA Drinking Water Security Research Program; 3.1 Background; 3.2 Research Drivers; 3.3 Objectives and Desired Outcomes; 3.4 Water Security Research; 3.4.1 Protection and Prevention
    Description / Table of Contents: 3.4.1.1 Blast Vulnerability Assessment Tool
    Note: Includes bibliographical references and indexes , Electronic reproduction; Available via World Wide Web
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...