Environmental Engineering Reference
In-Depth Information
Ezell, B.C. (1998).
Risks of Cyber Attack to Supervisory Control and Data Acquisition
.
Charlottesville: University of Virginia.
FBI. (2000).
Threat to Critical Infrastructure
. Washington, DC: Federal Bureau of
Investigation.
FBI. (2004).
Ninth Annual Computer Crime and Security Survey
. Washington, DC:
Computer Crime Institute and Federal Bureau of Investigations.
GAO. (2003).
Critical Infrastructure Protection: Challenges in Securing Control System
.
Washington, DC: U.S. General Accounting Office.
Gellman, B. (2002). Cyber attacks by Al Qaeda feared: terrorists at threshold of using
Internet as tool of bloodshed, experts say.
Washington Post
, June 26, p. A01.
Greenburg, A. et al. (1999).
Standard Methods for the Examination of Water and Wastewater
,
20th ed. Denver, CO: American Water Works Association.
Henry, K. (2002). New face of security.
Government Security
, April, pp. 30-31.
IBWA. (2004).
Bottled Water Safety and Security
. Alexandria, VA: International Bottled
Water Association.
NIPC. (2002).
National Infrastructure Protection Center Report
. Washington, DC:
National Infrastructure Protection Center.
Stamp, J. et al. (2003).
Common Vulnerabilities in Critical Infrastructure Control Systems
,
2nd ed. Albuquerque, NM: Sandia National Laboratories.
USEPA. (2001).
Water Protection Task Force Alert #IV: What Wastewater Utilities Can
Do Now to Guard Against Terrorist and Security Threats
. Washington, DC: U.S.
Environmental Protection Agency.
USEPA. (2004).
Water Security: Basic Information
. Washington, DC: U.S. Environmental
Protection Agency (
http://cfpub.epa.gov/safewater/watersecurity/basicin-
formation.cfm
).
USEPA. (2005).
EPA Needs to Determine What Barriers Prevent Water Systems from
Securing Known Supervisory Control and Data Acquisition (SCADA) Vulnerabilities
,
Briefing Report No. 2005-P-00002. Washington, DC: Office of Inspector General,
U.S. Environmental Protection Agency.