Techno Security s Guide to Securing SCADA

Techno Security s Guide to Securing SCADA
Author: Jack Wiles,Ted Claypoole,Phil Drake,Paul A. Henry,Lester J. Johnson,Sean Lowther,Greg Miles,Marc Weber Tobias,James H. Windle
Publsiher: Syngress
Total Pages: 352
Release: 2008-08-23
ISBN 10: 9780080569994
ISBN 13: 0080569994
Language: EN, FR, DE, ES & NL

Techno Security s Guide to Securing SCADA Book Review:

Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack. This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD. * Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure * Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures * Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more * Companion Website featuring video interviews with subject matter experts offer a "sit-down" with the leaders in the field

Strategic and Practical Approaches for Information Security Governance Technologies and Applied Solutions

Strategic and Practical Approaches for Information Security Governance  Technologies and Applied Solutions
Author: Gupta, Manish
Publsiher: IGI Global
Total Pages: 491
Release: 2012-02-29
ISBN 10: 1466601981
ISBN 13: 9781466601987
Language: EN, FR, DE, ES & NL

Strategic and Practical Approaches for Information Security Governance Technologies and Applied Solutions Book Review:

Organizations, worldwide, have adopted practical and applied approaches for mitigating risks and managing information security program. Considering complexities of a large-scale, distributed IT environments, security should be proactively planned for and prepared ahead, rather than as used as reactions to changes in the landscape. Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions presents high-quality research papers and practice articles on management and governance issues in the field of information security. The main focus of the book is to provide an organization with insights into practical and applied solutions, frameworks, technologies and practices on technological and organizational factors. The book aims to be a collection of knowledge for professionals, scholars, researchers and academicians working in this field that is fast evolving and growing as an area of information assurance.

Thermal Power Plants

Thermal Power Plants
Author: Mohammad Rasul
Publsiher: BoD – Books on Demand
Total Pages: 280
Release: 2012-01-13
ISBN 10: 9533079525
ISBN 13: 9789533079523
Language: EN, FR, DE, ES & NL

Thermal Power Plants Book Review:

Thermal power plants are one of the most important process industries for engineering professionals. Over the past few decades, the power sector has been facing a number of critical issues. However, the most fundamental challenge is meeting the growing power demand in sustainable and efficient ways. Practicing power plant engineers not only look after operation and maintenance of the plant, but also look after a range of activities, including research and development, starting from power generation, to environmental assessment of power plants. The book Thermal Power Plants covers features, operational issues, advantages, and limitations of power plants, as well as benefits of renewable power generation. It also introduces thermal performance analysis, fuel combustion issues, performance monitoring and modelling, plants health monitoring, including component fault diagnosis and prognosis, functional analysis, economics of plant operation and maintenance, and environmental aspects. This book addresses several issues related to both coal fired and gas turbine power plants. The book is suitable for both undergraduate and research for higher degree students, and of course, for practicing power plant engineers.

Securing the Smart Grid

Securing the Smart Grid
Author: Tony Flick,Justin Morehouse
Publsiher: Elsevier
Total Pages: 320
Release: 2010-11-03
ISBN 10: 9781597495714
ISBN 13: 1597495719
Language: EN, FR, DE, ES & NL

Securing the Smart Grid Book Review:

Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies. A smart grid is a modernized electric grid that uses information and communications technology to be able to process information, such as the behaviors of suppliers and consumers. The book discusses different infrastructures in a smart grid, such as the automatic metering infrastructure (AMI). It also discusses the controls that consumers, device manufacturers, and utility companies can use to minimize the risk associated with the smart grid. It explains the smart grid components in detail so readers can understand how the confidentiality, integrity, and availability of these components can be secured or compromised. This book will be a valuable reference for readers who secure the networks of smart grid deployments, as well as consumers who use smart grid devices. Details how old and new hacking techniques can be used against the grid and how to defend against them Discusses current security initiatives and how they fall short of what is needed Find out how hackers can use the new infrastructure against itself

Cyber Behavior Concepts Methodologies Tools and Applications

Cyber Behavior  Concepts  Methodologies  Tools  and Applications
Author: Management Association, Information Resources
Publsiher: IGI Global
Total Pages: 2300
Release: 2014-04-30
ISBN 10: 1466659432
ISBN 13: 9781466659438
Language: EN, FR, DE, ES & NL

Cyber Behavior Concepts Methodologies Tools and Applications Book Review:

Following the migration of workflows, data, and communication to the Cloud and other Internet-based frameworks, interaction over the Web has become ever more commonplace. As with any social situation, there are rules and consequences to actions within a virtual environment. Cyber Behavior: Concepts, Methodologies, Tools, and Applications explores the role of cyberspace in modern communication and interaction, including considerations of ethics, crime, security, and education. With chapters on a variety of topics and concerns inherent to a contemporary networked society, this multi-volume work will be of particular interest to students and academicians, as well as software developers, computer scientists, and specialists in the field of Information Technologies.

Library Journal

Library Journal
Author: Anonim
Publsiher: Anonim
Total Pages: 329
Release: 2008
ISBN 10:
ISBN 13: UCSC:32106017981504
Language: EN, FR, DE, ES & NL

Library Journal Book Review:

Cyber security of SCADA and Other Industrial Control Systems

Cyber security of SCADA and Other Industrial Control Systems
Author: Edward J. M. Colbert,Alexander Kott
Publsiher: Springer
Total Pages: 355
Release: 2016-08-23
ISBN 10: 3319321250
ISBN 13: 9783319321257
Language: EN, FR, DE, ES & NL

Cyber security of SCADA and Other Industrial Control Systems Book Review:

This book provides a comprehensive overview of the fundamental security of Industrial Control Systems (ICSs), including Supervisory Control and Data Acquisition (SCADA) systems and touching on cyber-physical systems in general. Careful attention is given to providing the reader with clear and comprehensive background and reference material for each topic pertinent to ICS security. This book offers answers to such questions as: Which specific operating and security issues may lead to a loss of efficiency and operation? What methods can be used to monitor and protect my system? How can I design my system to reduce threats?This book offers chapters on ICS cyber threats, attacks, metrics, risk, situational awareness, intrusion detection, and security testing, providing an advantageous reference set for current system owners who wish to securely configure and operate their ICSs. This book is appropriate for non-specialists as well. Tutorial information is provided in two initial chapters and in the beginnings of other chapters as needed. The book concludes with advanced topics on ICS governance, responses to attacks on ICS, and future security of the Internet of Things.

Protecting Your Internet Identity

Protecting Your Internet Identity
Author: Ted Claypoole,Theresa Payton
Publsiher: Rowman & Littlefield
Total Pages: 288
Release: 2016-11-16
ISBN 10: 144226540X
ISBN 13: 9781442265400
Language: EN, FR, DE, ES & NL

Protecting Your Internet Identity Book Review:

People research everything online – shopping, school, jobs, travel – and other people. Your online persona is your new front door. It is likely the first thing that new friends and colleagues learn about you. In the years since this book was first published, the Internet profile and reputation have grown more important in the vital human activities of work, school and relationships. This updated edition explores the various ways that people may use your Internet identity, including the ways bad guys can bully, stalk or steal from you aided by the information they find about you online. The authors look into the Edward Snowden revelations and the government’s voracious appetite for personal data. A new chapter on the right to be forgotten explores the origins and current effects of this new legal concept, and shows how the new right could affect us all. Timely information helping to protect your children on the Internet and guarding your business’s online reputation has also been added. The state of Internet anonymity has been exposed to scrutiny lately, and the authors explore how anonymous you can really choose to be when conducting activity on the web. The growth of social networks is also addressed as a way to project your best image and to protect yourself from embarrassing statements. Building on the first book, this new edition has everything you need to know to protect yourself, your family, and your reputation online.

Cyber Security and Threat Politics

Cyber Security and Threat Politics
Author: Myriam Dunn Cavelty
Publsiher: Routledge
Total Pages: 192
Release: 2007-11-28
ISBN 10: 1134086695
ISBN 13: 9781134086696
Language: EN, FR, DE, ES & NL

Cyber Security and Threat Politics Book Review:

This book explores the political process behind the construction of cyber-threats as one of the quintessential security threats of modern times in the US. Myriam Dunn Cavelty posits that cyber-threats are definable by their unsubstantiated nature. Despite this, they have been propelled to the forefront of the political agenda. Using an innovative theoretical approach, this book examines how, under what conditions, by whom, for what reasons, and with what impact cyber-threats have been moved on to the political agenda. In particular, it analyses how governments have used threat frames, specific interpretive schemata about what counts as a threat or risk and how to respond to this threat. By approaching this subject from a security studies angle, this book closes a gap between practical and theoretical academic approaches. It also contributes to the more general debate about changing practices of national security and their implications for the international community.

Cyber Security in Parallel and Distributed Computing

Cyber Security in Parallel and Distributed Computing
Author: Dac-Nhuong Le,Raghvendra Kumar,Brojo Kishore Mishra,Jyotir Moy Chatterjee,Manju Khari
Publsiher: John Wiley & Sons
Total Pages: 294
Release: 2019-04-16
ISBN 10: 1119488052
ISBN 13: 9781119488057
Language: EN, FR, DE, ES & NL

Cyber Security in Parallel and Distributed Computing Book Review:

The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. It also includes various real-time/offline applications and case studies in the fields of engineering and computer science and the modern tools and technologies used. Information on cybersecurity technologies is organized in the fifteen chapters of this book. This important book cover subjects such as: Research and solutions for the problem of hidden image detection Security aspects of data mining and possible solution techniques A comparative analysis of various methods used in e-commerce security and how to perform secure payment transactions in an efficient manner Blockchain technology and how it is crucial to the security industry Security for the Internet of Things Security issues and challenges in distributed computing security such as heterogeneous computing, cloud computing, fog computing, etc. Demonstrates the administration task issue in unified cloud situations as a multi-target enhancement issue in light of security Explores the concepts of cybercrime and cybersecurity and presents the statistical impact it is having on organizations Highlights some strategies for maintaining the privacy, integrity, confidentiality and availability of cyber information and its real-world impacts such as mobile security software for secure email and online banking, cyber health check programs for business, cyber incident response management, cybersecurity risk management Security policies and mechanisms, various categories of attacks (e.g., denial-of-service), global security architecture, along with distribution of security mechanisms Security issues in the healthcare sector with existing solutions and emerging threats.

Critical Infrastructure Security and Resilience

Critical Infrastructure Security and Resilience
Author: Dimitris Gritzalis,Marianthi Theocharidou,George Stergiopoulos
Publsiher: Springer
Total Pages: 313
Release: 2019-01-01
ISBN 10: 3030000249
ISBN 13: 9783030000240
Language: EN, FR, DE, ES & NL

Critical Infrastructure Security and Resilience Book Review:

This book presents the latest trends in attacks and protection methods of Critical Infrastructures. It describes original research models and applied solutions for protecting major emerging threats in Critical Infrastructures and their underlying networks. It presents a number of emerging endeavors, from newly adopted technical expertise in industrial security to efficient modeling and implementation of attacks and relevant security measures in industrial control systems; including advancements in hardware and services security, interdependency networks, risk analysis, and control systems security along with their underlying protocols. Novel attacks against Critical Infrastructures (CI) demand novel security solutions. Simply adding more of what is done already (e.g. more thorough risk assessments, more expensive Intrusion Prevention/Detection Systems, more efficient firewalls, etc.) is simply not enough against threats and attacks that seem to have evolved beyond modern analyses and protection methods. The knowledge presented here will help Critical Infrastructure authorities, security officers, Industrial Control Systems (ICS) personnel and relevant researchers to (i) get acquainted with advancements in the field, (ii) integrate security research into their industrial or research work, (iii) evolve current practices in modeling and analyzing Critical Infrastructures, and (iv) moderate potential crises and emergencies influencing or emerging from Critical Infrastructures.

TechnoSecurity s Guide to E Discovery and Digital Forensics

TechnoSecurity s Guide to E Discovery and Digital Forensics
Author: Jack Wiles
Publsiher: Elsevier
Total Pages: 400
Release: 2011-10-13
ISBN 10: 008055881X
ISBN 13: 9780080558813
Language: EN, FR, DE, ES & NL

TechnoSecurity s Guide to E Discovery and Digital Forensics Book Review:

TechnoSecurity's Guide to E-Discovery and Digital Forensics provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial. Internationally known experts in computer forensics share their years of experience at the forefront of digital forensics Bonus chapters on how to build your own Forensics Lab 50% discount to the upcoming Techno Forensics conference for everyone who purchases a book

False Consolation

False Consolation
Author: Ted Claypoole
Publsiher: Anonim
Total Pages: 236
Release: 2019-11-06
ISBN 10: 9781704741192
ISBN 13: 170474119X
Language: EN, FR, DE, ES & NL

False Consolation Book Review:

Murder or Suicide? Matt Bishop and his high-tech team of investigators dig into an apparent crime leading them from the secrets of Seattle's wealthy citizens, through racists, torturers, bullies, diamond smugglers and video gamers, and into the darkest recesses of the underworld. The deeper they fall into this fetid and corrupt world, the more danger envelops them.Matt Bishop and Alex Candiotti, former Army Intelligence unit mates in Iraq and owners of a large multi-city detective agency headquartered in Seattle, agree to investigate the apparent suicide of their most important client's son, Darius Wells. Matt suspects that the teenager was murdered, and seeks confirmation of the fact at the scene of the crime. The sheriff's report of the death as suicide seemed inept or corrupt, compounded by the sheriff's office losing important evidence that Matt and Alex need to review.Matt, Alex and their administrative director and former police officer, April Chatham, stalk the remaining evidence, discovering that Darius led a life hidden from his parents. They uncover tales of blackmail, extortion, and theft of the Wells' neighbors and friends, all blamed in part on Darius, who had seemed an innocent, nerdy kid. They also investigate signs that the murder of Darius Wells was racially motivated, and evidence relating to a personal vendetta against Darius at school. Nothing seems to add up.With dark humor and the technological resources once only available to government spies, Matt, April and Alex lead the investigative team of hackers, drone operators, researchers and detectives into a puzzle that confounds them all. Surprise and death await around every turn, forcing Matt to confront the police and to call on his military training.Perfect for fans of Robert Parker, Walter Mosely, and West Coast Noir, with even a splash of Ian Fleming in the mix, this novel establishes strong characters you will want to return to, a fast and twisty plot, clever crime solving, with the multicultural urban cast and reliance on modern technology readers should expect from a novel set in a twenty-first century American city.

Critical Information Infrastructures Security

Critical Information Infrastructures Security
Author: Christos G. Panayiotou,Georgios Ellinas,Elias Kyriakides,Marios M. Polycarpou
Publsiher: Springer
Total Pages: 388
Release: 2016-03-24
ISBN 10: 3319316648
ISBN 13: 9783319316642
Language: EN, FR, DE, ES & NL

Critical Information Infrastructures Security Book Review:

This book constitutes revised selected papers from the 9th International Conference on Critical Information Infrastructures Security, CRITIS 2014, held in Limassol, Cyprus, in October 2014. The 20 full and 19 short papers presented in this volume were carefully reviewed and selected from 74 submissions. They are organized in topical sections named: cyber-physical systems and sensor networks; security of water systems; power and energy system security; security and recovery policies, cyber security; and security tools and protocols.

Handbook of e Business Security

Handbook of e Business Security
Author: João Manuel R.S. Tavares,Brojo Kishore Mishra,Raghvendra Kumar,Noor Zaman,Manju Khari
Publsiher: CRC Press
Total Pages: 398
Release: 2018-07-27
ISBN 10: 0429887078
ISBN 13: 9780429887079
Language: EN, FR, DE, ES & NL

Handbook of e Business Security Book Review:

There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind, companies that have control over their e-business are likely to prosper most. In other words, setting up and maintaining a secure e-business is essential and important to business growth. This book covers state-of-the art practices in e-business security, including privacy, trust, security of transactions, big data, cloud computing, social network, and distributed systems.

Developing Cybersecurity Programs and Policies

Developing Cybersecurity Programs and Policies
Author: Omar Santos
Publsiher: Pearson IT Certification
Total Pages: 99998
Release: 2018-07-20
ISBN 10: 0134858549
ISBN 13: 9780134858548
Language: EN, FR, DE, ES & NL

Developing Cybersecurity Programs and Policies Book Review:

All the Knowledge You Need to Build Cybersecurity Programs and Policies That Work Clearly presents best practices, governance frameworks, and key standards Includes focused coverage of healthcare, finance, and PCI DSS compliance An essential and invaluable guide for leaders, managers, and technical professionals Today, cyberattacks can place entire organizations at risk. Cybersecurity can no longer be delegated to specialists: success requires everyone to work together, from leaders on down. Developing Cybersecurity Programs and Policies offers start-to-finish guidance for establishing effective cybersecurity in any organization. Drawing on more than 20 years of real-world experience, Omar Santos presents realistic best practices for defining policy and governance, ensuring compliance, and collaborating to harden the entire organization. First, Santos shows how to develop workable cybersecurity policies and an effective framework for governing them. Next, he addresses risk management, asset management, and data loss prevention, showing how to align functions from HR to physical security. You’ll discover best practices for securing communications, operations, and access; acquiring, developing, and maintaining technology; and responding to incidents. Santos concludes with detailed coverage of compliance in finance and healthcare, the crucial Payment Card Industry Data Security Standard (PCI DSS) standard, and the NIST Cybersecurity Framework. Whatever your current responsibilities, this guide will help you plan, manage, and lead cybersecurity–and safeguard all the assets that matter. Learn How To · Establish cybersecurity policies and governance that serve your organization’s needs · Integrate cybersecurity program components into a coherent framework for action · Assess, prioritize, and manage security risk throughout the organization · Manage assets and prevent data loss · Work with HR to address human factors in cybersecurity · Harden your facilities and physical environment · Design effective policies for securing communications, operations, and access · Strengthen security throughout the information systems lifecycle · Plan for quick, effective incident response and ensure business continuity · Comply with rigorous regulations in finance and healthcare · Plan for PCI compliance to safely process payments · Explore and apply the guidance provided by the NIST Cybersecurity Framework

Handbook of Information and Communication Security

Handbook of Information and Communication Security
Author: Peter Stavroulakis,Mark Stamp
Publsiher: Springer Science & Business Media
Total Pages: 867
Release: 2010-02-23
ISBN 10: 9783642041174
ISBN 13: 3642041175
Language: EN, FR, DE, ES & NL

Handbook of Information and Communication Security Book Review:

At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called “Y2K” issue. Te Y2K scare was the fear that c- puter networks and the systems that are controlled or operated by sofware would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A positive outcome of this scare was the creation of several Computer Emergency Response Teams (CERTs) around the world that now work - operatively to exchange expertise and information, and to coordinate in case major problems should arise in the modern IT environment. Te terrorist attacks of 11 September 2001 raised security concerns to a new level. Te - ternational community responded on at least two fronts; one front being the transfer of reliable information via secure networks and the other being the collection of information about - tential terrorists. As a sign of this new emphasis on security, since 2001, all major academic publishers have started technical journals focused on security, and every major communi- tions conference (for example, Globecom and ICC) has organized workshops and sessions on security issues. In addition, the IEEE has created a technical committee on Communication and Information Security. Te ?rst editor was intimately involved with security for the Athens Olympic Games of 2004.

Embedded Systems Security

Embedded Systems Security
Author: David Kleidermacher,Mike Kleidermacher
Publsiher: Elsevier
Total Pages: 396
Release: 2012
ISBN 10: 0123868866
ISBN 13: 9780123868862
Language: EN, FR, DE, ES & NL

Embedded Systems Security Book Review:

Front Cover; Dedication; Embedded Systems Security: Practical Methods for Safe and Secure Softwareand Systems Development; Copyright; Contents; Foreword; Preface; About this Book; Audience; Organization; Approach; Acknowledgements; Chapter 1 -- Introduction to Embedded Systems Security; 1.1What is Security?; 1.2What is an Embedded System?; 1.3Embedded Security Trends; 1.4Security Policies; 1.5Security Threats; 1.6Wrap-up; 1.7Key Points; 1.8 Bibliography and Notes; Chapter 2 -- Systems Software Considerations; 2.1The Role of the Operating System; 2.2Multiple Independent Levels of Security.

The Best Damn Cybercrime and Digital Forensics Book Period

The Best Damn Cybercrime and Digital Forensics Book Period
Author: Jack Wiles,Anthony Reyes
Publsiher: Syngress
Total Pages: 736
Release: 2011-04-18
ISBN 10: 9780080556086
ISBN 13: 0080556086
Language: EN, FR, DE, ES & NL

The Best Damn Cybercrime and Digital Forensics Book Period Book Review:

Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible. IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference has increased in size by almost 50% in its second year; another example of the rapid growth in the market. This book is the first to combine cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. Everything needed for analyzing forensic data and recovering digital evidence can be found in one place, including instructions for building a digital forensics lab. * Digital investigation and forensics is a growing industry * Corporate I.T. departments investigating corporate espionage and criminal activities are learning as they go and need a comprehensive guide to e-discovery * Appeals to law enforcement agencies with limited budgets

Assessing Cyber Security

Assessing Cyber Security
Author: Maarten Gehem,Artur Usanov,Erik Frinking,Michel Rademaker
Publsiher: The Hague Centre for Strategic Studies
Total Pages: 329
Release: 2015-04-16
ISBN 10: 9492102129
ISBN 13: 9789492102126
Language: EN, FR, DE, ES & NL

Assessing Cyber Security Book Review:

Over the years, a plethora of reports has emerged that assess the causes, dynamics, and effects of cyber threats. This proliferation of reports is an important sign of the increasing prominence of cyber attacks for organizations, both public and private, and citizens all over the world. In addition, cyber attacks are drawing more and more attention in the media. Such efforts can help to better awareness and understanding of cyber threats and pave the way to improved prevention, mitigation, and resilience. This report aims to help in this task by assessing what we know about cyber security threats based on a review of 70 studies published by public authorities, companies, and research organizations from about 15 countries over the last few years. It answers the following questions: what do we know about the number, origin, and impact of cyber attacks? What are the current and emerging cyber security trends? And how well are we prepared to face these threats?