Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, History, Military, Strategy
Cover of the book Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370919666
Publisher: Progressive Management Publication: June 24, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370919666
Publisher: Progressive Management
Publication: June 24, 2018
Imprint: Smashwords Edition
Language: English

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public. Those services are essential to U.S. security, economy, and health. Many documents, some dating back to the Cold War era, examine deterrence strategies to defend critical infrastructure against physical attacks, but literature regarding deterrence against cyberattacks on critical infrastructure is minimal. Deterrence is most important when defense is difficult, and defending critical infrastructure in cyber space is significantly difficult. Unlike conventional attacks, cyberattacks are fast and inexpensive, with ambiguous sources of origin. That is why a serious study deterring cyberattacks against critical infrastructure is necessary. Although the U.S. government is aware of the dangers posed by cyberattacks against its critical infrastructure, it does not have a well-developed strategy for deterring them. This thesis analyzes current U.S. cyber deterrence strategies and explores the feasibility of deterring cyberattacks against U.S. critical infrastructure.

I. INTRODUCTION * A. RESEARCH QUESTION * B. PROBLEM DESCRIPTION AND SIGNIFICANCE * C. LITERATURE REVIEW * 1. Protecting Critical Infrastructure * 2. Cyber Deterrence * D. METHODOLOGY * E. THESIS OVERVIEW * II. CYBERATTACKS ON CRITICAL INFRASTRUCTURE * A. INTRODUCTION * B. STUXNET * 1. Iran's Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * C. BOWMAN AVENUE DAM * 1. U.S. Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * D. SUMMARY * III. CONCLUSION * A. LESSONS LEARNED * 1. Deterrence Policy and Deterrence Failure * 2. Attribution * 3. Retaliation * B. IMPLICATIONS FOR U.S. POLICY * C. CAN THE UNITED STATES DETER CYBERATTACKS ON ITS CRITICAL INFRASTRUCTURE? * D. RECOMMENDATIONS FOR FUTURE RESEARCH

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public. Those services are essential to U.S. security, economy, and health. Many documents, some dating back to the Cold War era, examine deterrence strategies to defend critical infrastructure against physical attacks, but literature regarding deterrence against cyberattacks on critical infrastructure is minimal. Deterrence is most important when defense is difficult, and defending critical infrastructure in cyber space is significantly difficult. Unlike conventional attacks, cyberattacks are fast and inexpensive, with ambiguous sources of origin. That is why a serious study deterring cyberattacks against critical infrastructure is necessary. Although the U.S. government is aware of the dangers posed by cyberattacks against its critical infrastructure, it does not have a well-developed strategy for deterring them. This thesis analyzes current U.S. cyber deterrence strategies and explores the feasibility of deterring cyberattacks against U.S. critical infrastructure.

I. INTRODUCTION * A. RESEARCH QUESTION * B. PROBLEM DESCRIPTION AND SIGNIFICANCE * C. LITERATURE REVIEW * 1. Protecting Critical Infrastructure * 2. Cyber Deterrence * D. METHODOLOGY * E. THESIS OVERVIEW * II. CYBERATTACKS ON CRITICAL INFRASTRUCTURE * A. INTRODUCTION * B. STUXNET * 1. Iran's Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * C. BOWMAN AVENUE DAM * 1. U.S. Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * D. SUMMARY * III. CONCLUSION * A. LESSONS LEARNED * 1. Deterrence Policy and Deterrence Failure * 2. Attribution * 3. Retaliation * B. IMPLICATIONS FOR U.S. POLICY * C. CAN THE UNITED STATES DETER CYBERATTACKS ON ITS CRITICAL INFRASTRUCTURE? * D. RECOMMENDATIONS FOR FUTURE RESEARCH

More books from Progressive Management

Cover of the book Cold War Infrastructure for Strategic Air Command (SAC): The Bomber Mission - Hangars, Command Posts, Major Commands, B-36, B-47, and B-52, Sixteen Air Force Bases from Barksdale to Whiteman by Progressive Management
Cover of the book Breaking the Ice: Potential U.S. - Russian Maritime Conflict in the Arctic - Disputed Areas, Lomonosov Ridge, Bering Strait, Beaufort Sea, Northwest Passage, Hans Island, NATO Perspective, UNCLOS by Progressive Management
Cover of the book A History of Sea-Air Aviation: Wings Over The Ocean - Chronicling the History of Sea-Air Flight Operations, Early Aviation History, World War II Naval Aviation, Chanute, Curtiss, Lindbergh by Progressive Management
Cover of the book Prelude to the Total Force: The Air National Guard 1943-1969 - ANG Forged in Politics, Struggle for Control, Integrating with the Active Force, Cold Warriors, Vindication, Berlin Airlift, Korean War by Progressive Management
Cover of the book Recommended Practices for Human Space Flight Occupant Safety: Integration of Occupant and Public Safety, Radiation, Manufacturing, Operations, Medical Considerations by Progressive Management
Cover of the book Fire in the City: Airpower in Urban, Smaller-Scale Contingencies (USSC) - Case Studies of Hue 1968, Siege of Beirut 1982, Operation Just Cause 1989, UNOSOM Somalia, Uphold Democracy 1994 by Progressive Management
Cover of the book Marines in the Korean War Commemorative Series: Counteroffensive - U.S. Marines from Pohang to No Name Line - Matthew Ridgway, Truman Fires MacArthur, Medical Helicopter Evacuation by Progressive Management
Cover of the book Flight Research: Problems Encountered and What They Should Teach Us - Lunar Landing Research Vehicle, X-15, YF-12 Blackbird, P-51 Mustang, Lifting Bodies by Progressive Management
Cover of the book Venture into Space: Early Years of Goddard Space Flight Center - Vanguard, Mercury Tracking, Explorer, Pioneer, Tiros, Telstar, Relay, Syncom Satellites (NASA SP-4301) by Progressive Management
Cover of the book 2013 Complete Guide to Military Sexual Assault and Trauma (MST) - Senate Hearings, Victim Testimony, Military Justice and Investigations, VA Study Course and Guidelines, Harassment and Rape by Progressive Management
Cover of the book Strategic Aggression: Conditions That Could Trigger Aggressive Military Action by the People's Republic of China (PRC) - Case Studies of Interwar Germany, Modern China, Secrecy, PLA, Communist Party by Progressive Management
Cover of the book The Swarm, the Cloud, and the Importance of Getting There First: What's at Stake in the Remote Aviation Culture Debate, Remotely Piloted Aircraft (RPA), Air-Mindedness, Manned-Remote Fusion by Progressive Management
Cover of the book 21st Century West Nile Virus (WNV) Sourcebook: Clinical Data for Patients, Families, and Physicians, including Symptoms, Prevention, Risk Groups, Mosquito Control Issues, Birds and Animals Affected by Progressive Management
Cover of the book Nuclear Weapon Accident Response Procedures (NARP) - Accident Site, Weapon Recovery, Site Remediation, Radiological Hazard and Safety, Medical Issues, Security, Public Affairs by Progressive Management
Cover of the book 2012 Defense Acquisitions: Assessments of Selected Weapon Programs by the GAO - Army, Navy, Air Force Weapons Systems including UAS Programs, Missiles, Ships, F-35 JSF, Carriers, Space Fence by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy