Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, History, Military, Strategy
Cover of the book Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370919666
Publisher: Progressive Management Publication: June 24, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370919666
Publisher: Progressive Management
Publication: June 24, 2018
Imprint: Smashwords Edition
Language: English

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public. Those services are essential to U.S. security, economy, and health. Many documents, some dating back to the Cold War era, examine deterrence strategies to defend critical infrastructure against physical attacks, but literature regarding deterrence against cyberattacks on critical infrastructure is minimal. Deterrence is most important when defense is difficult, and defending critical infrastructure in cyber space is significantly difficult. Unlike conventional attacks, cyberattacks are fast and inexpensive, with ambiguous sources of origin. That is why a serious study deterring cyberattacks against critical infrastructure is necessary. Although the U.S. government is aware of the dangers posed by cyberattacks against its critical infrastructure, it does not have a well-developed strategy for deterring them. This thesis analyzes current U.S. cyber deterrence strategies and explores the feasibility of deterring cyberattacks against U.S. critical infrastructure.

I. INTRODUCTION * A. RESEARCH QUESTION * B. PROBLEM DESCRIPTION AND SIGNIFICANCE * C. LITERATURE REVIEW * 1. Protecting Critical Infrastructure * 2. Cyber Deterrence * D. METHODOLOGY * E. THESIS OVERVIEW * II. CYBERATTACKS ON CRITICAL INFRASTRUCTURE * A. INTRODUCTION * B. STUXNET * 1. Iran's Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * C. BOWMAN AVENUE DAM * 1. U.S. Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * D. SUMMARY * III. CONCLUSION * A. LESSONS LEARNED * 1. Deterrence Policy and Deterrence Failure * 2. Attribution * 3. Retaliation * B. IMPLICATIONS FOR U.S. POLICY * C. CAN THE UNITED STATES DETER CYBERATTACKS ON ITS CRITICAL INFRASTRUCTURE? * D. RECOMMENDATIONS FOR FUTURE RESEARCH

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public. Those services are essential to U.S. security, economy, and health. Many documents, some dating back to the Cold War era, examine deterrence strategies to defend critical infrastructure against physical attacks, but literature regarding deterrence against cyberattacks on critical infrastructure is minimal. Deterrence is most important when defense is difficult, and defending critical infrastructure in cyber space is significantly difficult. Unlike conventional attacks, cyberattacks are fast and inexpensive, with ambiguous sources of origin. That is why a serious study deterring cyberattacks against critical infrastructure is necessary. Although the U.S. government is aware of the dangers posed by cyberattacks against its critical infrastructure, it does not have a well-developed strategy for deterring them. This thesis analyzes current U.S. cyber deterrence strategies and explores the feasibility of deterring cyberattacks against U.S. critical infrastructure.

I. INTRODUCTION * A. RESEARCH QUESTION * B. PROBLEM DESCRIPTION AND SIGNIFICANCE * C. LITERATURE REVIEW * 1. Protecting Critical Infrastructure * 2. Cyber Deterrence * D. METHODOLOGY * E. THESIS OVERVIEW * II. CYBERATTACKS ON CRITICAL INFRASTRUCTURE * A. INTRODUCTION * B. STUXNET * 1. Iran's Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * C. BOWMAN AVENUE DAM * 1. U.S. Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * D. SUMMARY * III. CONCLUSION * A. LESSONS LEARNED * 1. Deterrence Policy and Deterrence Failure * 2. Attribution * 3. Retaliation * B. IMPLICATIONS FOR U.S. POLICY * C. CAN THE UNITED STATES DETER CYBERATTACKS ON ITS CRITICAL INFRASTRUCTURE? * D. RECOMMENDATIONS FOR FUTURE RESEARCH

More books from Progressive Management

Cover of the book 21st Century U.S. Military Manuals: Counterinsurgency (COIN) Field Manual (FM 3-24) Tactics, Intelligence, Airpower by Petraeus - Plus Bonus IED Coverage (Value-added Professional Format Series) by Progressive Management
Cover of the book U.S. Army Medical Correspondence Course: Management of Patients With Respiratory Dysfunctions - Respiratory System, Devices to Aid Breathing, Administering Oxygen, Suctioning by Progressive Management
Cover of the book The Report of the Presidential Commission on the Space Shuttle Challenger Accident: The Tragedy of Mission 51-L in 1986 - Volume One of the Rogers Commission Report by Progressive Management
Cover of the book Veteran Homelessness: Department of Veterans Affairs Homeless Assessment Report to Congress by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: U.S. Marine Corps (USMC) Religious Ministry Team (RMT) Training and Readiness Manual, Handbook, Religious Ministry Support, Chaplain Individual Training by Progressive Management
Cover of the book Case Studies in Strategic Bombardment: World War II, British and American Air Offensive, Atom Bomb, Pacific, Korea, Vietnam, Gulf War, Doctrine, Planning, Operations, From the B-17 to the B-2 Bomber by Progressive Management
Cover of the book Hoover Dam: The Boulder Canyon Project - Historic Setting, Construction History, Design, Boulder City, Post Construction History, Settlement of Project Lands, Uses of Project Water by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Paranasal Sinus and Nasal Cavity Cancer - Clinical Data for Patients, Families, and Physicians by Progressive Management
Cover of the book Fire Weather (Agriculture Handbook 360) Part 2 - Guide for Application of Meteorological Information to Forest Fire Control Operations, Winds, Moisture, Temperature, Fronts, Thunderstorms, Climate by Progressive Management
Cover of the book Re-forging the Iron Division: The Reconstitution of the 28th Infantry Division between the Hurtgen Forest and the Ardennes - World War II Battles in 1944, Preparation for the Battle of the Bulge by Progressive Management
Cover of the book Mosquitoes to Wolves: The Evolution of the Airborne Forward Air Controller - T-6, F-4, C-47, A-10, T-28, B-26, A-19, O-1, O-2, OV-10, F-100 Aircraft by Progressive Management
Cover of the book Amphibious Landing Operations in World War II: Personal Experience in Applying and Developing Doctrine - Lucian Truscott's Leadership in Operations Torch and Husky and the Third Infantry Division by Progressive Management
Cover of the book Bitcoin Digital Currency and Blockchain Technology: Disruptive Computer Technology, Movement of Money, Tokenization of Assets, Mt. Gox, Advanced Cryptographic Signatures, Cyber Security, Banking by Progressive Management
Cover of the book Conflict Management and "Whole of Government": Useful Tools for U.S. National Security Strategy? Loose Nukes, WMD, Fukushima, Rinderpest, Embassy Security, Afghanistan, Iraq, Sudan by Progressive Management
Cover of the book Punishment, Revenge, and Retribution: A Historical Analysis of Punitive Operations - Justifications for War, British Army Somaliland, U.S. Punitive Expedition 1916, El Dorado Canyon Libya 1986 by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy