Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, History, Military, Strategy
Cover of the book Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370919666
Publisher: Progressive Management Publication: June 24, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370919666
Publisher: Progressive Management
Publication: June 24, 2018
Imprint: Smashwords Edition
Language: English

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public. Those services are essential to U.S. security, economy, and health. Many documents, some dating back to the Cold War era, examine deterrence strategies to defend critical infrastructure against physical attacks, but literature regarding deterrence against cyberattacks on critical infrastructure is minimal. Deterrence is most important when defense is difficult, and defending critical infrastructure in cyber space is significantly difficult. Unlike conventional attacks, cyberattacks are fast and inexpensive, with ambiguous sources of origin. That is why a serious study deterring cyberattacks against critical infrastructure is necessary. Although the U.S. government is aware of the dangers posed by cyberattacks against its critical infrastructure, it does not have a well-developed strategy for deterring them. This thesis analyzes current U.S. cyber deterrence strategies and explores the feasibility of deterring cyberattacks against U.S. critical infrastructure.

I. INTRODUCTION * A. RESEARCH QUESTION * B. PROBLEM DESCRIPTION AND SIGNIFICANCE * C. LITERATURE REVIEW * 1. Protecting Critical Infrastructure * 2. Cyber Deterrence * D. METHODOLOGY * E. THESIS OVERVIEW * II. CYBERATTACKS ON CRITICAL INFRASTRUCTURE * A. INTRODUCTION * B. STUXNET * 1. Iran's Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * C. BOWMAN AVENUE DAM * 1. U.S. Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * D. SUMMARY * III. CONCLUSION * A. LESSONS LEARNED * 1. Deterrence Policy and Deterrence Failure * 2. Attribution * 3. Retaliation * B. IMPLICATIONS FOR U.S. POLICY * C. CAN THE UNITED STATES DETER CYBERATTACKS ON ITS CRITICAL INFRASTRUCTURE? * D. RECOMMENDATIONS FOR FUTURE RESEARCH

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public. Those services are essential to U.S. security, economy, and health. Many documents, some dating back to the Cold War era, examine deterrence strategies to defend critical infrastructure against physical attacks, but literature regarding deterrence against cyberattacks on critical infrastructure is minimal. Deterrence is most important when defense is difficult, and defending critical infrastructure in cyber space is significantly difficult. Unlike conventional attacks, cyberattacks are fast and inexpensive, with ambiguous sources of origin. That is why a serious study deterring cyberattacks against critical infrastructure is necessary. Although the U.S. government is aware of the dangers posed by cyberattacks against its critical infrastructure, it does not have a well-developed strategy for deterring them. This thesis analyzes current U.S. cyber deterrence strategies and explores the feasibility of deterring cyberattacks against U.S. critical infrastructure.

I. INTRODUCTION * A. RESEARCH QUESTION * B. PROBLEM DESCRIPTION AND SIGNIFICANCE * C. LITERATURE REVIEW * 1. Protecting Critical Infrastructure * 2. Cyber Deterrence * D. METHODOLOGY * E. THESIS OVERVIEW * II. CYBERATTACKS ON CRITICAL INFRASTRUCTURE * A. INTRODUCTION * B. STUXNET * 1. Iran's Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * C. BOWMAN AVENUE DAM * 1. U.S. Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * D. SUMMARY * III. CONCLUSION * A. LESSONS LEARNED * 1. Deterrence Policy and Deterrence Failure * 2. Attribution * 3. Retaliation * B. IMPLICATIONS FOR U.S. POLICY * C. CAN THE UNITED STATES DETER CYBERATTACKS ON ITS CRITICAL INFRASTRUCTURE? * D. RECOMMENDATIONS FOR FUTURE RESEARCH

More books from Progressive Management

Cover of the book Inside the International Space Station (ISS): NASA Thermal Control System (TCS) and Simplified Aid for EVA Rescue (SAFER) Astronaut Training Manuals by Progressive Management
Cover of the book 21st Century FEMA Study Course: Introduction to Residential Coastal Construction (IS-386) - Beach Nourishment and Replenishment, Flood and Wind, Codes and Siting, Wildfires, Tsunami and Hurricane by Progressive Management
Cover of the book Crossing the Line of Departure: Battle Command on the Move, A Historical Perspective - Ancient Times, Genghis Khan, Yorktown, Civil War, World War I and II Industrial Age, Vietnam, Gulf War, Iraq War by Progressive Management
Cover of the book FBI Report: Financial Crimes, Corporate Fraud, Securities and Commodities, Health Care, Mortgage, Insurance, Mass Marketing, Money Laundering, Forensic Accountant, Financial Intelligence by Progressive Management
Cover of the book Nanoscience and Nanotechnology: Bridging NanoEHS (Environmental, Health, and Safety) Research Efforts: A Joint U.S.-EU Workshop, Nanomaterials Assessment by Progressive Management
Cover of the book Air Force Leadership Study: The Need for Deliberate Development - Leadership Concepts for Air Force Officers, Changes in Personnel and Education Policy by Progressive Management
Cover of the book Bahrain: Federal Research Study with Comprehensive Information, History, and Analysis - History, Politics, Economy, Persian Gulf States by Progressive Management
Cover of the book Failed Intervention: The United States in the Balkans - Origins of War, Disintegration, U.S. Strategic Lessons, Legacy of Yugoslavia by Progressive Management
Cover of the book 2013 Master Guide to Syria and the Syrian Chemical Weapons Crisis: Threat of U.S. Military Strike by Obama, Congressional Options, Sarin Nerve Gas, Civil War, Rebel Groups, Bashar al-Assad by Progressive Management
Cover of the book From One Leader to Another: Volumes I and II – Observations, Insights, and Advice from Over 50 Serving and Retired Senior NCOs on Tasks, Skills, Values, and Responsibilities for the Army Today by Progressive Management
Cover of the book The Civil War Begins: Opening Clashes, 1861 - Fort Sumter, Virginia and Bull Run, The Fight for Missouri, From Belmont to Port Royal by Progressive Management
Cover of the book Factors of Religious Violence and a Path to Peace: A Study of the 16th Century Anabaptists - Radical Protestant Reformation, Apocalypticism, Melchioite Leaders, Munster Rebellion, Christian Doctrine by Progressive Management
Cover of the book Operational Risk Defined Through a Complex Operating Environment: U.S. Intervention in Somalia, Combined Joint Task Force Horn of Africa, Analysis of Environmental, Institutional, and Social Factors by Progressive Management
Cover of the book Geothermal Tomorrow: Work of the Department of Energy and the Geothermal Technologies Program, National Laboratory, Enhanced Geothermal Systems (EGS), Price, Financing, Utilities, State Policies by Progressive Management
Cover of the book Essential Guide to Interrogation and Torture: CIA KUBARK Counterintelligence Interrogation Manual, Human Resource Exploitation Training Manual, Art and Science of Interrogation by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy