Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, History, Military, Strategy
Cover of the book Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370919666
Publisher: Progressive Management Publication: June 24, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370919666
Publisher: Progressive Management
Publication: June 24, 2018
Imprint: Smashwords Edition
Language: English

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public. Those services are essential to U.S. security, economy, and health. Many documents, some dating back to the Cold War era, examine deterrence strategies to defend critical infrastructure against physical attacks, but literature regarding deterrence against cyberattacks on critical infrastructure is minimal. Deterrence is most important when defense is difficult, and defending critical infrastructure in cyber space is significantly difficult. Unlike conventional attacks, cyberattacks are fast and inexpensive, with ambiguous sources of origin. That is why a serious study deterring cyberattacks against critical infrastructure is necessary. Although the U.S. government is aware of the dangers posed by cyberattacks against its critical infrastructure, it does not have a well-developed strategy for deterring them. This thesis analyzes current U.S. cyber deterrence strategies and explores the feasibility of deterring cyberattacks against U.S. critical infrastructure.

I. INTRODUCTION * A. RESEARCH QUESTION * B. PROBLEM DESCRIPTION AND SIGNIFICANCE * C. LITERATURE REVIEW * 1. Protecting Critical Infrastructure * 2. Cyber Deterrence * D. METHODOLOGY * E. THESIS OVERVIEW * II. CYBERATTACKS ON CRITICAL INFRASTRUCTURE * A. INTRODUCTION * B. STUXNET * 1. Iran's Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * C. BOWMAN AVENUE DAM * 1. U.S. Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * D. SUMMARY * III. CONCLUSION * A. LESSONS LEARNED * 1. Deterrence Policy and Deterrence Failure * 2. Attribution * 3. Retaliation * B. IMPLICATIONS FOR U.S. POLICY * C. CAN THE UNITED STATES DETER CYBERATTACKS ON ITS CRITICAL INFRASTRUCTURE? * D. RECOMMENDATIONS FOR FUTURE RESEARCH

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public. Those services are essential to U.S. security, economy, and health. Many documents, some dating back to the Cold War era, examine deterrence strategies to defend critical infrastructure against physical attacks, but literature regarding deterrence against cyberattacks on critical infrastructure is minimal. Deterrence is most important when defense is difficult, and defending critical infrastructure in cyber space is significantly difficult. Unlike conventional attacks, cyberattacks are fast and inexpensive, with ambiguous sources of origin. That is why a serious study deterring cyberattacks against critical infrastructure is necessary. Although the U.S. government is aware of the dangers posed by cyberattacks against its critical infrastructure, it does not have a well-developed strategy for deterring them. This thesis analyzes current U.S. cyber deterrence strategies and explores the feasibility of deterring cyberattacks against U.S. critical infrastructure.

I. INTRODUCTION * A. RESEARCH QUESTION * B. PROBLEM DESCRIPTION AND SIGNIFICANCE * C. LITERATURE REVIEW * 1. Protecting Critical Infrastructure * 2. Cyber Deterrence * D. METHODOLOGY * E. THESIS OVERVIEW * II. CYBERATTACKS ON CRITICAL INFRASTRUCTURE * A. INTRODUCTION * B. STUXNET * 1. Iran's Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * C. BOWMAN AVENUE DAM * 1. U.S. Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * D. SUMMARY * III. CONCLUSION * A. LESSONS LEARNED * 1. Deterrence Policy and Deterrence Failure * 2. Attribution * 3. Retaliation * B. IMPLICATIONS FOR U.S. POLICY * C. CAN THE UNITED STATES DETER CYBERATTACKS ON ITS CRITICAL INFRASTRUCTURE? * D. RECOMMENDATIONS FOR FUTURE RESEARCH

More books from Progressive Management

Cover of the book Tactical Nuclear Weapons and NATO - U.S. Nuclear Weapons Development and Modernization Controversy, U.S. - Russian Reset, Non-Strategic Nuclear Weapons (NSNW), Arms Control Options, START by Progressive Management
Cover of the book 2012 Republican Vice Presidential Candidate Paul Ryan: Issue Statements, Speeches, Thoughts and Policies, Complete Path to Prosperity Federal Budget Plans with Proposed Changes to Medicare and Taxes by Progressive Management
Cover of the book The USAF in Korea: A Chronology 1950-1953 - Flying Boxcar C-119, Relationship of Military Operations to Land Battle, Naval Operations, and Political and Diplomatic Events, First All-Jet Air Battle by Progressive Management
Cover of the book 21st Century FEMA Study Course: Improving Preparedness and Resilience through Public-Private Partnerships (IS-662) by Progressive Management
Cover of the book The Spoken Word: Recollections of Dryden History, The Early Years (NASA SP-2003-4530) - Scott Crossfield Interview, Muroc, NACA Research, X-1 Project by Progressive Management
Cover of the book Cruise Missiles for the U. S. Navy: An Exemplar of Innovation in a Military Organization - Sperry's Aerial Torpedo, Project Aphrodite, Gorgon Missile, Drones, Regulus, Harpoon, Tomahawk by Progressive Management
Cover of the book Marshall Center Reports: North Korea and Iran's Nuclear Programs as Instability Factors, How Iran Would Apply its Asymmetric Naval Warfare Doctrine in a Future Conflict - Hormuz Chokepoint by Progressive Management
Cover of the book Regionalism and Secession: German Bavarian and Spanish Catalan Regionalism, Heimat Mediation, Kulturnation, Demystifying Nazi Centralism, Castilian Hegemony, Francoist Spain 1939-1975 by Progressive Management
Cover of the book Zika Virus: Examining the U.S. Public Health Response, Coordination of a Multi-Agency Response, Global Zika Epidemic, Mosquito-borne Pathogen, Microcephaly Congenital Birth Defect, Vaccine Development by Progressive Management
Cover of the book Russia Reports (Volume 4) - International Affairs, Putin, Moldova, Transnistria, Ukraine, Georgia, Chechnya, Lithuania, Belarus, Iran, Natural Gas, Energy Policy, Arms Control, Nonproliferation by Progressive Management
Cover of the book U.S. Army Medical Correspondence Course: Red Meats - Terminology, Beef Introduction, Inspection of Carcass, Cuts, Roasts, Steaks, Fat, Pork and Loin Roasts, Cured, Smoked, Sausage by Progressive Management
Cover of the book Official U.S. Reports on North Korea: Military and Security Developments Involving the Democratic People's Republic of Korea (DPRK), North Korea's Nuclear Weapons Development and Diplomacy by Progressive Management
Cover of the book The U.S. Air Force in Space 1945 to the Twenty-first Century: Recollections of General Schriever, Balancing Technology and Reliability, Cold War, Space Power, Persian Gulf War, Manned versus Unmanned by Progressive Management
Cover of the book Case Studies in the Use of Land-Based Aerial Forces in Maritime Operations, 1939-1990: Battle of the Atlantic, Arctic Convoys, Dunkirk, Pacific, Repulse Sinking, Falklands War, Cold War, Tanker War by Progressive Management
Cover of the book Airlift Doctrine: Comprehensive History from pre-World War II, World War II, Vietnam, to the Modern Era, Air Mobility, National Strategy, Airlift at Risk, the Future of Airlift Doctrine by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy