Setola / Sforza / Vittorini | Railway Infrastructure Security | E-Book | www2.sack.de
E-Book

E-Book, Englisch, 249 Seiten

Reihe: Engineering (R0)

Setola / Sforza / Vittorini Railway Infrastructure Security


1. Auflage 2015
ISBN: 978-3-319-04426-2
Verlag: Springer Nature Switzerland
Format: PDF
Kopierschutz: 1 - PDF Watermark

E-Book, Englisch, 249 Seiten

Reihe: Engineering (R0)

ISBN: 978-3-319-04426-2
Verlag: Springer Nature Switzerland
Format: PDF
Kopierschutz: 1 - PDF Watermark



This comprehensive monograph addresses crucial issues in the protection of railway systems, with the objective of enhancing the understanding of railway infrastructure security. Based on analyses by academics, technology providers and railway operators, it explains how to assess terrorist and criminal threats, design countermeasures, and implement effective security strategies. In so doing, it draws upon a range of experiences from different countries in Europe and beyond. The book is the first to be devoted entirely to this subject. It will serve as a timely reminder of the attractiveness of the railway infrastructure system as a target for criminals and terrorists and, more importantly, as a valuable resource for stakeholders and professionals in the railway security field aiming to develop effective security based on a mix of methodological, technological and organizational tools. Besides researchers and decision makers in the field, the book will appeal to students interested in critical infrastructure protection.  

Setola / Sforza / Vittorini Railway Infrastructure Security jetzt bestellen!

Weitere Infos & Material


1;Foreword;6
2;Acknowledgments;11
3;Contents;12
4;1 Introduction;14
4.1;Abstract;14
4.2;1 Introduction;15
4.3;2 The Critical Infrastructure Protection;16
4.4;3 The Railway Infrastructure System in the CIP Arena;17
4.5;4 The METRIP Project;20
4.6;5 The Railway Infrastructure Security Book;21
4.7;6 Conclusions;23
5;2 Towards Integrated Railway Protection;25
5.1;Abstract;25
5.2;1 Railway: Constantly Striving for Safety;25
5.3;2 The Emergence of Security;26
5.4;3 The Transport Environment;26
5.5;4 Everyday Security in the Railway Scenario;27
5.6;5 Personal Freedom and Collective Security;28
5.7;6 The Terrorist Threat;29
5.8;7 The Cost of Security;29
5.9;8 Security of Stations: The Challenge of Joined-Up Thinking;30
5.10;9 Consistency at European and International Level;31
5.11;10 Specific Aspects of High Speed Systems: Risks and Opportunities;31
5.12;11 UIC Involvement;32
5.12.1;11.1 UIC Fundamental Values;33
5.12.2;11.2 UIC Security Platform;33
5.12.3;11.3 UIC Research Focuses;34
5.13;12 Conclusions;35
6;3 The Railway Security: Methodologies and Instruments for Protecting a Critical Infrastructure;37
6.1;Abstract;37
6.2;1 Introduction---Why Security?;37
6.3;2 The Security in the Railway Transport;38
6.4;3 Railway: A Critical Infrastructure;39
6.5;4 CIP---Critical Infrastructure Protection;39
6.6;5 Threats in Rail Transport;40
6.6.1;5.1 The Terroristic Threat;41
6.6.2;5.2 Theft of Copper;42
6.7;6 The Security Structures in the Main European Railway Organizations;44
6.7.1;6.1 France (Soci00E9t00E9 Nationale des Chemins de fer Français---SNCF);44
6.7.2;6.2 Spain (RENFE);45
6.7.3;6.3 Poland (PKP Polskie Linie Kolejowe S.A.---PKP PLK S.A.);45
6.7.4;6.4 Switzerland (Schweizerische Bundesbahnen---SBB CFF FFS);46
6.7.5;6.5 Italy (Ferrovie dello Stato Italiane SpA---FS SpA);46
6.8;7 International Organizations Involved in Railway Security;47
6.8.1;7.1 Colpofer;47
6.8.1.1;7.1.1 The Method;48
6.8.1.2;7.1.2 The Mission;48
6.8.2;7.2 Security Platform UIC;49
6.8.3;7.3 Brenner Group;51
6.9;8 Infrastructures Security: A General Survey Regarding the Current Regulation;51
6.10;9 Corporate Protection in Rail Transport Companies;54
6.10.1;9.1 Tasks;54
6.10.2;9.2 The Organization of the Security Function;55
6.11;10 Human Resources;56
6.11.1;10.1 Recruitment;56
6.11.2;10.2 Training;57
6.12;11 Crisis Management;58
6.13;12 Risk Management;58
6.13.1;12.1 The Italian Case of Risk Management by Rete Ferroviaria Italiana SpA, within Ferrovie dello Stato Italiane Group;59
6.14;13 The Information Security;62
6.15;14 Assets Protection Technology in the Railway Field;63
6.15.1;14.1 The Components of a Security System;64
6.15.2;14.2 Security Logic;65
6.15.3;14.3 Security Logic for a Medium-Small Railway Station---Layout;66
6.15.4;14.4 Security Logic for the Main Head Stations and New High Speed Structures---Layout;69
6.15.5;14.5 Control Room;71
6.15.6;14.6 Security for Railway Undertakings;71
6.16;15 Conclusions;74
7;4 Vulnerability Assessment in RIS Scenario Through a Synergic Use of the CPTED Methodology and the System Dynamics Approach;76
7.1;Abstract;76
7.2;1 Introduction;77
7.3;2 The CPTED Methodology;78
7.3.1;2.1 CPTED's Historical Evolution and Main Influences;79
7.3.2;2.2 CPTED: Key Elements;82
7.3.3;2.3 The Application of CPTED to Railway Infrastructure System;84
7.4;3 The Systems Dynamics Approach;86
7.4.1;3.1 Systems Dynamics Main Features;87
7.5;4 The Model;88
7.5.1;4.1 Simulation Results;92
7.6;5 Conclusions;98
7.7;References;99
8;5 Cumana and Circumflegrea Railway Lines: A Circle Network in the Western Metropolitan Area of Naples;101
8.1;Abstract;101
8.2;1 Introduction;101
8.3;2 SEPSA Urban Railway System: Cumana and Circumflegrea;102
8.4;3 Security Challenges;105
8.5;4 Critical Infrastructures of Cumana and Circumflegrea Lines;108
8.5.1;4.1 SEPSA Network System;108
8.5.2;4.2 Critical Assets in the SEPSA Railway System;109
8.5.3;4.3 Maintenance Center Location Problem;111
8.5.4;4.4 Service Time in Case of System Failures;112
8.6;5 Conclusions;117
8.7;Acknowledgments;117
8.8;References;118
9;6 Coping with Suicide Bombing Israel Railways Security Challenges 2000--2005;119
9.1;Abstract;119
9.2;1 Forward;119
9.3;2 Israel Railways;120
9.4;3 The Suicide Bombing Campaign, 2000--2005;120
9.5;4 Israel Railways Response to Suicide Bombing;125
9.6;5 Israel Railways Security Response;126
9.7;6 Conclusions;130
9.8;Further Readings;131
10;7 Technologies for the Implementation of a Security System on Rail Transportation Infrastructures;132
10.1;Abstract;132
10.2;1 Introduction;133
10.3;2 Railway/Metro Security System: Application Context;134
10.4;3 Risk Analysis and Risk Scenarios;135
10.5;4 Critical Assets of a Railway System;136
10.6;5 Security Technologies;137
10.7;6 CCTV and Video Analytics System;138
10.8;7 Alarm Outputs for a Video Analytic System;139
10.9;8 Access Control and Anti-intrusion Systems;140
10.10;9 Abnormal Sound Detection System;142
10.11;10 CBRNe System;143
10.12;11 Application of the Protection Systems on the Assets of a Railway System;144
10.13;12 Stations;145
10.14;13 Tracks;146
10.15;14 Depot;146
10.16;15 Tunnel and Bridges;146
10.17;16 Electrical Substations;147
10.18;17 Integrated Management of the Protection Devices;147
10.19;18 Alarm Management;149
10.20;19 Conclusions;149
10.21;References;149
11;8 A Model-Driven Process for Physical Protection System Design and Vulnerability Evaluation;151
11.1;Abstract;151
11.2;1 METRIP Model-Driven Process;152
11.3;2 The CIP_VAM UML Profile;154
11.3.1;2.1 CIP_VAM UML Extensions;156
11.3.2;2.2 CIP_VAM Library;159
11.4;3 Model Transformations;160
11.4.1;3.1 Forward Transformation Chains;160
11.4.2;3.2 Backward Transformation Chains;164
11.5;4 A Railway Station Case Study;165
11.5.1;4.1 Step 1: Modeling the Infrastructure;167
11.5.2;4.2 Step 2: Modeling the Attacks;168
11.5.3;4.3 Step 3: Modeling Possible Protections;170
11.5.4;4.4 Step 4: Application of the ODM Transformation Chain;171
11.5.5;4.5 Step 5: Vulnerability Analysis;173
11.6;5 Related Work;175
11.7;6 Conclusions;176
11.8;References;177
12;9 Optimal Location of Security Devices;178
12.1;Abstract;178
12.2;1 Introduction;179
12.3;2 Protection Devices for a RIS;180
12.4;3 State of the Art of the Sensor Placement Problem;181
12.5;4 The Optimization Module;182
12.5.1;4.1 Asset Discretization;183
12.5.2;4.2 Coverage Analysis;184
12.5.3;4.3 Coverage Model Selection;186
12.5.3.1;4.3.1 Minimization of the Control Devices Number;187
12.5.3.2;4.3.2 Maximization of the Covered Region;189
12.5.4;4.4 Framework of the OM;190
12.6;5 Experimental Results;191
12.6.1;5.1 Open Space Test Case;191
12.6.2;5.2 Railway Station Case;196
12.7;6 Conclusions;201
12.8;Acknowledgments;202
12.9;References;202
13;10 The METRIP Tool;204
13.1;Abstract;204
13.2;1 Introduction;205
13.3;2 A Reference Architecture;207
13.4;3 Component Specifications;208
13.4.1;3.1 System Level Specifications;209
13.4.2;3.2 UML Modelling Module (UMLM);210
13.4.3;3.3 Optimization Module (OM);210
13.4.4;3.4 Vulnerability Analysis Module (VAM);212
13.5;4 Enabling Technologies and Tools;212
13.6;5 Prototype Implementation;214
13.6.1;5.1 Model Transformations;215
13.6.2;5.2 User Interface;217
13.6.3;5.3 Localization Back-End;219
13.7;6 Conclusions;220
13.8;Acknowledgments;220
13.9;References;221
14;11 Optimizing Investment Decisions for Railway Systems Protection;222
14.1;Abstract;222
14.2;1 Introduction;222
14.3;2 Background;224
14.4;3 The Railway Protection Investment Model;226
14.5;4 Solution Methodology;228
14.6;5 Case Study and Analysis;229
14.7;6 Conclusions and Discussion;238
14.8;References;239
15;12 The Security into the Metro System: The Copenhagen Metro Experience;241
15.1;Abstract;241
15.2;1 Introduction;241
15.3;2 The Threats;242
15.4;3 The Vulnerabilities;244
15.5;4 Metro Copenhagen;244
15.6;5 Cityringen Security Features;247
15.6.1;5.1 Security Solution;248
15.6.2;5.2 Operations Security;248
15.7;6 System Description and Architecture;248
15.7.1;6.1 General;248
15.7.2;6.2 Closed Circuit Television System (CCTV) and Video Analytics;249
15.7.3;6.3 Intrusion Detection and Access Control System;251
15.7.4;6.4 Perimeter Intrusion Detection System;252
15.8;7 Reliability and Redundancy;255
15.9;8 Conclusion;255



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.