Environmental Engineering Reference
In-Depth Information
Ezell, B.C. (1998). Risks of Cyber Attack to Supervisory Control and Data Acquisition .
Charlottesville: University of Virginia.
FBI. (2000). Threat to Critical Infrastructure . Washington, DC: Federal Bureau of
Investigation.
FBI. (2004). Ninth Annual Computer Crime and Security Survey . Washington, DC:
Computer Crime Institute and Federal Bureau of Investigations.
GAO. (2003). Critical Infrastructure Protection: Challenges in Securing Control System .
Washington, DC: U.S. General Accounting Office.
Gellman, B. (2002). Cyber attacks by Al Qaeda feared: terrorists at threshold of using
Internet as tool of bloodshed, experts say. Washington Post , June 26, p. A01.
Greenburg, A. et al. (1999). Standard Methods for the Examination of Water and Wastewater ,
20th ed. Denver, CO: American Water Works Association.
Henry, K. (2002). New face of security. Government Security , April, pp. 30-31.
IBWA. (2004). Bottled Water Safety and Security . Alexandria, VA: International Bottled
Water Association.
NIPC. (2002). National Infrastructure Protection Center Report . Washington, DC:
National Infrastructure Protection Center.
Stamp, J. et al. (2003). Common Vulnerabilities in Critical Infrastructure Control Systems ,
2nd ed. Albuquerque, NM: Sandia National Laboratories.
USEPA. (2001). Water Protection Task Force Alert #IV: What Wastewater Utilities Can
Do Now to Guard Against Terrorist and Security Threats . Washington, DC: U.S.
Environmental Protection Agency.
USEPA. (2004). Water Security: Basic Information . Washington, DC: U.S. Environmental
Protection Agency ( http://cfpub.epa.gov/safewater/watersecurity/basicin-
formation.cfm ).
USEPA. (2005). EPA Needs to Determine What Barriers Prevent Water Systems from
Securing Known Supervisory Control and Data Acquisition (SCADA) Vulnerabilities ,
Briefing Report No. 2005-P-00002. Washington, DC: Office of Inspector General,
U.S. Environmental Protection Agency.
Search WWH ::




Custom Search