Cooperation between federal, state, and local governments, 22, 38, 92, 127–128, 145, 232, 241–243, 252, 277–278, 333–334, 357–359.

See also Cross-agency collaboration

Critical Infrastructure Information Security Act, 363n

Cross-agency collaboration, 331–332, 338–339, 350

Crosscutting challenges and technologies, 19–20, 33, 35, 313–334

autonomous mobile robotic technologies, 325–327.

See also Robotic technologies

biometrics, 329–330, 361

controlling access to physical and information systems, 329–330.

See also Authentication

coordination of crosscutting technologies, 331–332, 338

human and organizational factors, 330–331, 336.

See also Human factors

integrated data management, 317–320.

See also Data mining;

Information fusion

SCADA systems, 327–328.

See also Supervisory control and data acquisition systems

sensors and sensor networks, 320–325.

See also Sensors and sensor networks

systems analysis and modeling, 315–317.

See also Systems analysis and systems engineering;

Modeling and simulation

Cultural memory, normalization and, 284–286

Customs inspections, 56, 216, 319.

See also U.S. Customs Service

Customs-Trade Partnership Against Terrorism (C-TPAT), 219n, 319

Cyberattacks, 136–144.

See also Information technology

Cybersecurity, 10–12, 147–157, 361, 367.

See also Information technology

for energy systems, 182, 187–188, 190, 203–204, 208.

See also Supervisory control and data acquisition systems

D

Data integration. See Data mining;

Information fusion ;

Standards for data integration and database interoperability

Data management. See Data mining;

Information fusion

Data mining, 2, 117, 167–168, 170–171, 217, 225–226, 318–320.

See also Information fusion

Decision-making support, 80, 128–129, 162, 165, 230, 251, 291–293, 296–298, 316, 343–346

Decontamination, 2

of chemical agents, 9–10, 115, 118–120, 130

of human and agricultural systems, 8, 78, 94–96

of IT systems, 153–154

of radiological material, 51, 58–59

robotics for, 120, 230, 326

of water supplies, 9, 125–126

Defense Advanced Research Projects Agency (DARPA), 11, 116, 120, 168, 287, 309, 325–326, 338, 352–353, 355

Defense Modeling and Simulation Office in DOD, 287, 302

Defense Threat Reduction Agency (DTRA), 5–6, 57, 60, 63, 93, 129, 309, 316, 353

Denial-of-service attacks, 137, 149n, 153

Department of Commerce (DOC), 122, 348–349, 350

Department of Defense (DOD), 52–53, 57, 63, 68, 76, 80, 90, 92, 96, 145, 194, 230, 242, 287, 331, 350, 353–355

Department of Energy (DOE), 11–13, 45n, 52–54, 57, 63–64, 68, 90, 116, 188, 190–195, 207, 313, 320, 331, 338, 348–350, 352, 355, 358n

Department of Health and Human Services (HHS), 8, 75, 91–92, 94, 96, 102, 355, 358n

Department of Homeland Security, 21–22, 68, 339, 342, 345, 349

Department of the Interior, 138

Department of Justice (DOJ), 242, 245, 250

Department of State, 26n, 52, 54, 193, 255

Department of Transportation (DOT), 14–15, 122, 200, 213n, 232, 265, 351, 358

Detection, 28, 166, 228–229, 314, 330.

See also Sensors and sensor networks

use of information technology in detecting attacks, 146–147, 149–151, 166, 187, 207

Deutch Commission Report, 349n



The National Academies | 500 Fifth St. N.W. | Washington, D.C. 20001
Copyright © National Academy of Sciences. All rights reserved.
Terms of Use and Privacy Statement