Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, History, Military, Strategy
Cover of the book Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370919666
Publisher: Progressive Management Publication: June 24, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370919666
Publisher: Progressive Management
Publication: June 24, 2018
Imprint: Smashwords Edition
Language: English

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public. Those services are essential to U.S. security, economy, and health. Many documents, some dating back to the Cold War era, examine deterrence strategies to defend critical infrastructure against physical attacks, but literature regarding deterrence against cyberattacks on critical infrastructure is minimal. Deterrence is most important when defense is difficult, and defending critical infrastructure in cyber space is significantly difficult. Unlike conventional attacks, cyberattacks are fast and inexpensive, with ambiguous sources of origin. That is why a serious study deterring cyberattacks against critical infrastructure is necessary. Although the U.S. government is aware of the dangers posed by cyberattacks against its critical infrastructure, it does not have a well-developed strategy for deterring them. This thesis analyzes current U.S. cyber deterrence strategies and explores the feasibility of deterring cyberattacks against U.S. critical infrastructure.

I. INTRODUCTION * A. RESEARCH QUESTION * B. PROBLEM DESCRIPTION AND SIGNIFICANCE * C. LITERATURE REVIEW * 1. Protecting Critical Infrastructure * 2. Cyber Deterrence * D. METHODOLOGY * E. THESIS OVERVIEW * II. CYBERATTACKS ON CRITICAL INFRASTRUCTURE * A. INTRODUCTION * B. STUXNET * 1. Iran's Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * C. BOWMAN AVENUE DAM * 1. U.S. Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * D. SUMMARY * III. CONCLUSION * A. LESSONS LEARNED * 1. Deterrence Policy and Deterrence Failure * 2. Attribution * 3. Retaliation * B. IMPLICATIONS FOR U.S. POLICY * C. CAN THE UNITED STATES DETER CYBERATTACKS ON ITS CRITICAL INFRASTRUCTURE? * D. RECOMMENDATIONS FOR FUTURE RESEARCH

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public. Those services are essential to U.S. security, economy, and health. Many documents, some dating back to the Cold War era, examine deterrence strategies to defend critical infrastructure against physical attacks, but literature regarding deterrence against cyberattacks on critical infrastructure is minimal. Deterrence is most important when defense is difficult, and defending critical infrastructure in cyber space is significantly difficult. Unlike conventional attacks, cyberattacks are fast and inexpensive, with ambiguous sources of origin. That is why a serious study deterring cyberattacks against critical infrastructure is necessary. Although the U.S. government is aware of the dangers posed by cyberattacks against its critical infrastructure, it does not have a well-developed strategy for deterring them. This thesis analyzes current U.S. cyber deterrence strategies and explores the feasibility of deterring cyberattacks against U.S. critical infrastructure.

I. INTRODUCTION * A. RESEARCH QUESTION * B. PROBLEM DESCRIPTION AND SIGNIFICANCE * C. LITERATURE REVIEW * 1. Protecting Critical Infrastructure * 2. Cyber Deterrence * D. METHODOLOGY * E. THESIS OVERVIEW * II. CYBERATTACKS ON CRITICAL INFRASTRUCTURE * A. INTRODUCTION * B. STUXNET * 1. Iran's Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * C. BOWMAN AVENUE DAM * 1. U.S. Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * D. SUMMARY * III. CONCLUSION * A. LESSONS LEARNED * 1. Deterrence Policy and Deterrence Failure * 2. Attribution * 3. Retaliation * B. IMPLICATIONS FOR U.S. POLICY * C. CAN THE UNITED STATES DETER CYBERATTACKS ON ITS CRITICAL INFRASTRUCTURE? * D. RECOMMENDATIONS FOR FUTURE RESEARCH

More books from Progressive Management

Cover of the book Gangs and Crime in America: The Likelihood of Collaboration Between Central American Transnational Gangs and Terrorist Organizations - Mara Salvatrucha (MS-13), Tablighi Jammat, 18th Street Gang by Progressive Management
Cover of the book Fire Monitoring Handbook (FMH Fire Management Program Center, National Interagency Fire Center) Part 1 - Wildfire and Wildland Fire Environmental and Fire Observation, Vegetation Monitoring Protocols by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Multiservice Procedures for Aviation Urban Operations (FM 3-06.1) Fixed and Rotary Wing Aviation (Value-Added Professional Format Series) by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Kaposi Sarcoma - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book 2017 USS Fitzgerald Accident: Navy Preliminary Inquiry and Line of Duty Determination Report Regarding Injuries and Deaths of Seven Sailors in June 2017 Collision with Container Ship ACX Crystal by Progressive Management
Cover of the book Setup: What the Air Force Did in Vietnam and Why - Thoughts of Atomic Weapons, Bombing and Diplomacy, Linebacker, Laos and Cambodia, Mayaguez by Progressive Management
Cover of the book 21st Century Essential Guide to South and East China Sea Territorial Disputes Involving China and Japan - Senkaku (Diaoyu) Islands, Oil and Hydrocarbon Resources, East Asia and Pacific Disputes by Progressive Management
Cover of the book Historical Overview of Racism in the Military: Colonial Period, American Revolution, War of 1812, Civil War, Indian Campaigns, Spanish-American, World War I and II, Korean, Vietnam, Contemporary by Progressive Management
Cover of the book "Dirty Bomb" Attack: Assessing New York City's Level of Preparedness from a First Responder's Perspective - RDD Threats, Terrorists, Nuclear Terrorism, Meters and Monitors, Sheltering in Place by Progressive Management
Cover of the book The Archer's Tale: An Examination of English Archers During the Hundred Years War and Their Impact on Warfare and Society - Medieval England's Use of Large Infantry Formations with Longbows by Progressive Management
Cover of the book Green and Blue in the Wild Blue: An Examination of the Evolution of Army and Air Force Airpower Thinking and Doctrine Since Vietnam War - AirLand Battle, Desert Storm, Nuclear War, Close Air Support by Progressive Management
Cover of the book History of the Bureau of Diplomatic Security of the United States Department of State: Cold War, McCarthyism, Spies, Leaks, Bugs, Ambassador Dubs Killing, Moscow Embassy Bugging by Progressive Management
Cover of the book Augmenting Security on Department of Defense Installations to Defeat the Active Shooter Threat: Case Studies of Fort Hood, Washington Navy Yard, and Chattanooga Attacks, More Armed Personnel by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Communications in a "Come-As-You-Are" War - FM 24-12 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Marines in World War II Commemorative Series: Condition Red: Marine Defense Battalions in World War II - Pearl Harbor, Wake Island, African-American Defense Battalions, Peleliu, Marianas by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy