Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, History, Military, Strategy
Cover of the book Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370919666
Publisher: Progressive Management Publication: June 24, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370919666
Publisher: Progressive Management
Publication: June 24, 2018
Imprint: Smashwords Edition
Language: English

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public. Those services are essential to U.S. security, economy, and health. Many documents, some dating back to the Cold War era, examine deterrence strategies to defend critical infrastructure against physical attacks, but literature regarding deterrence against cyberattacks on critical infrastructure is minimal. Deterrence is most important when defense is difficult, and defending critical infrastructure in cyber space is significantly difficult. Unlike conventional attacks, cyberattacks are fast and inexpensive, with ambiguous sources of origin. That is why a serious study deterring cyberattacks against critical infrastructure is necessary. Although the U.S. government is aware of the dangers posed by cyberattacks against its critical infrastructure, it does not have a well-developed strategy for deterring them. This thesis analyzes current U.S. cyber deterrence strategies and explores the feasibility of deterring cyberattacks against U.S. critical infrastructure.

I. INTRODUCTION * A. RESEARCH QUESTION * B. PROBLEM DESCRIPTION AND SIGNIFICANCE * C. LITERATURE REVIEW * 1. Protecting Critical Infrastructure * 2. Cyber Deterrence * D. METHODOLOGY * E. THESIS OVERVIEW * II. CYBERATTACKS ON CRITICAL INFRASTRUCTURE * A. INTRODUCTION * B. STUXNET * 1. Iran's Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * C. BOWMAN AVENUE DAM * 1. U.S. Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * D. SUMMARY * III. CONCLUSION * A. LESSONS LEARNED * 1. Deterrence Policy and Deterrence Failure * 2. Attribution * 3. Retaliation * B. IMPLICATIONS FOR U.S. POLICY * C. CAN THE UNITED STATES DETER CYBERATTACKS ON ITS CRITICAL INFRASTRUCTURE? * D. RECOMMENDATIONS FOR FUTURE RESEARCH

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public. Those services are essential to U.S. security, economy, and health. Many documents, some dating back to the Cold War era, examine deterrence strategies to defend critical infrastructure against physical attacks, but literature regarding deterrence against cyberattacks on critical infrastructure is minimal. Deterrence is most important when defense is difficult, and defending critical infrastructure in cyber space is significantly difficult. Unlike conventional attacks, cyberattacks are fast and inexpensive, with ambiguous sources of origin. That is why a serious study deterring cyberattacks against critical infrastructure is necessary. Although the U.S. government is aware of the dangers posed by cyberattacks against its critical infrastructure, it does not have a well-developed strategy for deterring them. This thesis analyzes current U.S. cyber deterrence strategies and explores the feasibility of deterring cyberattacks against U.S. critical infrastructure.

I. INTRODUCTION * A. RESEARCH QUESTION * B. PROBLEM DESCRIPTION AND SIGNIFICANCE * C. LITERATURE REVIEW * 1. Protecting Critical Infrastructure * 2. Cyber Deterrence * D. METHODOLOGY * E. THESIS OVERVIEW * II. CYBERATTACKS ON CRITICAL INFRASTRUCTURE * A. INTRODUCTION * B. STUXNET * 1. Iran's Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * C. BOWMAN AVENUE DAM * 1. U.S. Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * D. SUMMARY * III. CONCLUSION * A. LESSONS LEARNED * 1. Deterrence Policy and Deterrence Failure * 2. Attribution * 3. Retaliation * B. IMPLICATIONS FOR U.S. POLICY * C. CAN THE UNITED STATES DETER CYBERATTACKS ON ITS CRITICAL INFRASTRUCTURE? * D. RECOMMENDATIONS FOR FUTURE RESEARCH

More books from Progressive Management

Cover of the book The Failure of Jihad in Saudi Arabia: AQAP, al-Qa'ida on the Arabian Peninsula, East Riyadh Bombing, al-Nashiri by Progressive Management
Cover of the book Defending Air Bases in an Age of Insurgency: History of Air Base Defense from World War I to Iraq, Lessons for the Noncontiguous Battlefield, Balad Base Case Study, Counterinsurgency Environment by Progressive Management
Cover of the book The Evolving Arctic: Current State of U.S. Arctic Policy - Strategies of Other Arctic Nations, Russia, Canada, Denmark, Norway, Sweden, Finland, Iceland, Icebreakers, UNCLOS, SAR Assets by Progressive Management
Cover of the book Navy Cold War Communication Context: Resources Associated With the Navy's Communication Program, 1946-1989 - Equipment and Facility Histories, Radio, Wireless, Vietnam, Satellite, Receivers, Radars by Progressive Management
Cover of the book The Evolution of the Combined Allied Headquarters in the North African Theater of Operations from 1942 to 1943: World War II Unity of Effort and Command, Eisenhower and Multinational Integration by Progressive Management
Cover of the book 2014 President Barack Obama's Speech to the United Nations about the Islamic State (IS) and America's War Against ISIS / ISIL Terrorism, Ukraine and Russia, Israel and Palestine, Ebola Outbreak by Progressive Management
Cover of the book The 3rd Marine Aircraft Wing in Desert Shield and Desert Storm: U.S. Marines in the Persian Gulf, 1990-1991 - Defense of Eastern Saudi Arabia and Bahrain, CentCom, SCUDs, Khafji, Al Jaber, Heliborne by Progressive Management
Cover of the book An Aversion to Risk: A Warning From the Past: Comparison of 1862 American Civil War Peninsula Campaign with General McClellan to the 2003 Iraq War Failures, Afghanistan, Goldwater-Nichols, Petraeus by Progressive Management
Cover of the book A Century of Misunderstanding: The History of the Development of Post Traumatic Stress Disorder (PTSD) Understanding in the United States Military - World War II, Korea, Vietnam, Iraq and Afghanistan by Progressive Management
Cover of the book Genocide and Airpower: Holocaust, Interventions on Humanitarian Grounds, Somalia, Bosnia, Kosovo, Iraq, Darfur, Defining Genocide, Nuremberg, Convention, United Nations Action, ISR Support by Progressive Management
Cover of the book The Defeat of the 7th Cavalry: Impact on the Nation - Custer's Little Bighorn Loss in the 1876 Indian Campaign, Early Indian Policy, Post Civil War Focus, Effect of the Massacre on the Army, Politics by Progressive Management
Cover of the book Medicines for Radiation Emergencies: Potassium Iodide (KI), Prussian Blue (Radiogardase), Filgrastim (Neupogen), DTPA (Diethylenetriaminepentaacetate) - Drugs for Radiation Exposure by Progressive Management
Cover of the book 21st Century FEMA Study Course: Decision Making and Problem Solving (IS-241.a) - Ethics, Brainstorming, Surveys, Problem-Solving Models, Groupthink, Discussion Groups, Case Studies by Progressive Management
Cover of the book Breaking the Mold: Tanks in the Cities - Five Case Studies: Sherman Tanks in World War II, Streets of Aachen, Pattons to the Rescue in Vietnam, Beirut in 1984, Grozny 1995, Fallujah in Iraq War 2004 by Progressive Management
Cover of the book Air Force Combat Units of World War II: Traces the Historical Lineage of Each Army Air Corps and U.S. Air Force Combat Group Active in the Second World War by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy