Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, History, Military, Strategy
Cover of the book Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370919666
Publisher: Progressive Management Publication: June 24, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370919666
Publisher: Progressive Management
Publication: June 24, 2018
Imprint: Smashwords Edition
Language: English

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public. Those services are essential to U.S. security, economy, and health. Many documents, some dating back to the Cold War era, examine deterrence strategies to defend critical infrastructure against physical attacks, but literature regarding deterrence against cyberattacks on critical infrastructure is minimal. Deterrence is most important when defense is difficult, and defending critical infrastructure in cyber space is significantly difficult. Unlike conventional attacks, cyberattacks are fast and inexpensive, with ambiguous sources of origin. That is why a serious study deterring cyberattacks against critical infrastructure is necessary. Although the U.S. government is aware of the dangers posed by cyberattacks against its critical infrastructure, it does not have a well-developed strategy for deterring them. This thesis analyzes current U.S. cyber deterrence strategies and explores the feasibility of deterring cyberattacks against U.S. critical infrastructure.

I. INTRODUCTION * A. RESEARCH QUESTION * B. PROBLEM DESCRIPTION AND SIGNIFICANCE * C. LITERATURE REVIEW * 1. Protecting Critical Infrastructure * 2. Cyber Deterrence * D. METHODOLOGY * E. THESIS OVERVIEW * II. CYBERATTACKS ON CRITICAL INFRASTRUCTURE * A. INTRODUCTION * B. STUXNET * 1. Iran's Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * C. BOWMAN AVENUE DAM * 1. U.S. Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * D. SUMMARY * III. CONCLUSION * A. LESSONS LEARNED * 1. Deterrence Policy and Deterrence Failure * 2. Attribution * 3. Retaliation * B. IMPLICATIONS FOR U.S. POLICY * C. CAN THE UNITED STATES DETER CYBERATTACKS ON ITS CRITICAL INFRASTRUCTURE? * D. RECOMMENDATIONS FOR FUTURE RESEARCH

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public. Those services are essential to U.S. security, economy, and health. Many documents, some dating back to the Cold War era, examine deterrence strategies to defend critical infrastructure against physical attacks, but literature regarding deterrence against cyberattacks on critical infrastructure is minimal. Deterrence is most important when defense is difficult, and defending critical infrastructure in cyber space is significantly difficult. Unlike conventional attacks, cyberattacks are fast and inexpensive, with ambiguous sources of origin. That is why a serious study deterring cyberattacks against critical infrastructure is necessary. Although the U.S. government is aware of the dangers posed by cyberattacks against its critical infrastructure, it does not have a well-developed strategy for deterring them. This thesis analyzes current U.S. cyber deterrence strategies and explores the feasibility of deterring cyberattacks against U.S. critical infrastructure.

I. INTRODUCTION * A. RESEARCH QUESTION * B. PROBLEM DESCRIPTION AND SIGNIFICANCE * C. LITERATURE REVIEW * 1. Protecting Critical Infrastructure * 2. Cyber Deterrence * D. METHODOLOGY * E. THESIS OVERVIEW * II. CYBERATTACKS ON CRITICAL INFRASTRUCTURE * A. INTRODUCTION * B. STUXNET * 1. Iran's Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * C. BOWMAN AVENUE DAM * 1. U.S. Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * D. SUMMARY * III. CONCLUSION * A. LESSONS LEARNED * 1. Deterrence Policy and Deterrence Failure * 2. Attribution * 3. Retaliation * B. IMPLICATIONS FOR U.S. POLICY * C. CAN THE UNITED STATES DETER CYBERATTACKS ON ITS CRITICAL INFRASTRUCTURE? * D. RECOMMENDATIONS FOR FUTURE RESEARCH

More books from Progressive Management

Cover of the book 21st Century Understanding Cancer Toolkit: Radiation Therapy and Treatment, Side Effect Management, External, Internal, IMRT, Brachytherapy - Information for Patients, Families, Caregivers by Progressive Management
Cover of the book The Air War in Southeast Asia: Case Studies of Selected Campaigns - Vietnam War, Ho Chi Minh Trail, Linebacker, All-weather Bombing, Strike Patterns, Campaign Impact by Progressive Management
Cover of the book Allied Participation in Operation Iraqi Freedom: Coalition of the Willing for the Iraq War 2003, Force Contributions by Nations, Challengers for Army Planners by Progressive Management
Cover of the book Condensed Analysis of the Ninth Air Force in the European Theater of Operations of World War II: D-Day, Normandy, Ardennes, Battle of the Bulge, Middle Wallop, Biggin Hill, Second World War by Progressive Management
Cover of the book Palestinian Territories in Perspective: Orientation Guide and Palestinian Cultural Orientation: Geography, History, Intifada, Jewish Settlers, Gaza City, Khan Yunis, Jabaliya, Hebron, Rafah, Ramallah by Progressive Management
Cover of the book Destination Moon: A History of the Lunar Orbiter Program - NASA Apollo Moon Landing Preparations, Boeing and Kodak Photo System, Problems with the Spacecraft, Great Lunar Exploration Achievements by Progressive Management
Cover of the book Navy Seals Gone Wild: Publicity, Fame, and the Loss of the Quiet Professional - Osama bin Laden Killing, Politics, Commodification Cycle, Consequences of Promoting Seals for Entertainment, Profit by Progressive Management
Cover of the book Understanding Social Media and Mass Mobilization in the Operational Environment: Relevance of Twitter and Facebook Trends in Army’s Future Operating Environment, Battleswarm and Future Warfare by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Small Intestine Cancer - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book 21st Century Pediatric Cancer Sourcebook: Childhood Liver Cancer - Hepatoblastoma, Hepatocellular Carcinoma, Undifferentiated Embryonal Sarcoma, Infantile Choriocarcinoma by Progressive Management
Cover of the book Division Level Social Media: Military Communications by Facebook, Instagram, and Twitter, Analysis of Usage by Public Affairs and Army Soldiers Focusing on Three Active Component Divisional Units by Progressive Management
Cover of the book Convergence: Special Operations Forces (SOF) and Civilian Law Enforcement - Escalation of Threats, SWAT, Comparison of Military and Law Enforcement, Factors Forging Future Convergence, Implications by Progressive Management
Cover of the book Within Our Reach: A National Strategy to Eliminate Child Abuse and Neglect Fatalities - 2016 Report of the Commission to Eliminate Child Abuse and Neglect Fatalities, Special Populations, Support by Progressive Management
Cover of the book 21st Century FEMA Study Course: Building for the Earthquakes of Tomorrow (IS-8.a) - Earthquake Causes and Characteristics, Effects, Protecting Your Community, Hazard Reduction by Progressive Management
Cover of the book Coercion for Hire: A Theory of Indirect Coercion - Four Historical Cases, Indonesia, Italy, Chile, Hezbollah, Surrogate Targeting, Covert/Overt Balance, Role of Positive Inducements, Political Warfare by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy