Comparative Analysis of Technological and Intelligent Terrorism Impacts on Complex Technical Systems

Comparative Analysis of Technological and Intelligent Terrorism Impacts on Complex Technical Systems
Author :
Publisher : IOS Press
Total Pages : 204
Release :
ISBN-10 : 9781614991311
ISBN-13 : 1614991316
Rating : 4/5 (316 Downloads)

Book Synopsis Comparative Analysis of Technological and Intelligent Terrorism Impacts on Complex Technical Systems by : N.A. Makhutov

Download or read book Comparative Analysis of Technological and Intelligent Terrorism Impacts on Complex Technical Systems written by N.A. Makhutov and published by IOS Press. This book was released on 2013-01-10 with total page 204 pages. Available in PDF, EPUB and Kindle. Book excerpt: Insider knowledge about a complex technical system, coupled with access to its elements, has the potential to be used for triggering the most disastrous of terrorist attacks. Technological terrorism is the unauthorized impact on a complex technical system with the intention of breaking down its protection and initiating secondary catastrophic processes to cause damage and loss outside the facility. Intelligent terrorism, on the other hand, is the unauthorized purposeful interference in the processes of design, construction or maintenance of a complex technical system, and is either aimed at increasing existing vulnerabilities or creating new ones. This book is based on the NATO Advanced Research Workshop (ARW) on ‘Comparative Analysis of Technological and Intelligence Terrorism Impacts on Complex Technical Systems’. It lays the foundation for a risk-informed approach to modeling, analyzing, managing and controlling complex technical systems in the face of terrorist attacks. To formulate such an approach, it is necessary to combine the insights of a spectrum of disciplines across engineering, human and social sciences, and economics. The book explains how an understanding of the vulnerabilities of complex technical systems to terrorist attack can reduce these vulnerabilities and contain or limit the impact of terrorism, and also the way in which such an understanding is crucial to the development of a set of design criteria and codes which will take such vulnerabilities into account. The book also identifies areas of further research and opportunities for future exchange and collaboration.


Comparative Analysis of Technological and Intelligent Terrorism Impacts on Complex Technical Systems Related Books

Comparative Analysis of Technological and Intelligent Terrorism Impacts on Complex Technical Systems
Language: en
Pages: 204
Authors: N.A. Makhutov
Categories: Political Science
Type: BOOK - Published: 2013-01-10 - Publisher: IOS Press

DOWNLOAD EBOOK

Insider knowledge about a complex technical system, coupled with access to its elements, has the potential to be used for triggering the most disastrous of terr
Probabilistic Modeling in System Engineering
Language: en
Pages: 292
Authors: Andrey Kostogryzov
Categories: Technology & Engineering
Type: BOOK - Published: 2018-09-26 - Publisher: BoD – Books on Demand

DOWNLOAD EBOOK

This book is intended for systems analysts, designers, developers, users, experts, as well as those involved in quality, risk, safety and security management, a
Global Trends 2040
Language: en
Pages: 158
Authors: National Intelligence Council
Categories:
Type: BOOK - Published: 2021-03 - Publisher: Cosimo Reports

DOWNLOAD EBOOK

"The ongoing COVID-19 pandemic marks the most significant, singular global disruption since World War II, with health, economic, political, and security implica
Oil and Gas Pipeline Infrastructure Insecurity
Language: en
Pages: 426
Authors: Abdul L. Abraham Jatto
Categories:
Type: BOOK - Published: - Publisher: Springer Nature

DOWNLOAD EBOOK

Protecting Individual Privacy in the Struggle Against Terrorists
Language: en
Pages: 376
Authors: National Research Council
Categories: Computers
Type: BOOK - Published: 2008-09-26 - Publisher: National Academies Press

DOWNLOAD EBOOK

All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate