Skip to main content

Critical Infrastructure Protection and Information Security

  • Chapter
Understanding Homeland Security

Abstract

One morning on a brisk fall day in early November, technicians at the Springfield Nuclear Power Plant notice a malfunctioning steam release valve on Cooling Tank One. A mechanical problem was discovered in a leaky seal that had been recently patched. No one thought to check the plant’s supervisory control and data acquisition (SCADA) system, which controls the cooling function for the plant. Technicians quickly recognized the leaky seal and corrected the problem without any impact on the plant’s overall operation. Shortly after the repair a similar situation is discovered in Cooling Tanks Two and Three. This time the technicians did not discover any mechanical failures and did not recognize the significance in reoccurring events. It is not until an examination of the SCADA system that the problem is diagnosed; the automated software has given the command to close the valves in Cooling Tanks Two and Three when hot air should have been vented. How did this occur? Only authorized plant employees have access to the software, which is password protected.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Baker, George. 2004. Critical infrastructure protection program workshop I working papers. George Mason University Press.

    Google Scholar 

  • Barnes, Joshua and Newbold, Kenneth. 2005. Humans as a critical infrastructure. IEEE Critical Infrastructure Protection Conference.

    Google Scholar 

  • Deaton, Michael. 2004. Critical infrastructure protection program workshop I working papers. George Mason University Press.

    Google Scholar 

  • Department of Homeland Security. 2005a. Interim National Infrastructure Protection Plan. Washington, D.C.

    Google Scholar 

  • Department of Homeland Security. 2005b. Strategic plan. <http://www.dhs.gov/interweb/assetlibrary/DHS_StratPlan_FINAL_spread.pdf>.

  • Department of Homeland Security. 2006. <http://www.dhs.gov>.

  • Office of Homeland Security. 2002. National strategy for homeland security. Washington, D.C. U.S.-Canada Power System Outage Task Force. 2004. Final report on the August 14, 2003 blackout in the United States and Canada: Causes and recommendations.

    Google Scholar 

  • USA PATRIOT Act. 2001. 42 USC 5195c(e).

    Google Scholar 

  • The White House. 1997. Critical foundations: Protecting America’s infrastructures. Washington, D.C.

    Google Scholar 

  • The White House. 1998. Presidential Decision Directive 63. Washington, D.C.

    Google Scholar 

  • The White House. 2003a. National strategy to secure cyberspace. Washington, D.C.

    Google Scholar 

  • The White Houses. 2003b. National Strategy for physical protection of critical infrastructures and key assets. Washington, D.C.

    Google Scholar 

Download references

Authors

Copyright information

© 2007 John B. Noftsinger, Jr., Kenneth F. Newbold, Jr., and Jack K. Wheeler

About this chapter

Cite this chapter

Noftsinger, J.B., Newbold, K.F., Wheeler, J.K. (2007). Critical Infrastructure Protection and Information Security. In: Understanding Homeland Security. Palgrave Macmillan, New York. https://doi.org/10.1057/9780230605114_5

Download citation

Publish with us

Policies and ethics