Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, History, Military, Strategy
Cover of the book Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370919666
Publisher: Progressive Management Publication: June 24, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370919666
Publisher: Progressive Management
Publication: June 24, 2018
Imprint: Smashwords Edition
Language: English

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public. Those services are essential to U.S. security, economy, and health. Many documents, some dating back to the Cold War era, examine deterrence strategies to defend critical infrastructure against physical attacks, but literature regarding deterrence against cyberattacks on critical infrastructure is minimal. Deterrence is most important when defense is difficult, and defending critical infrastructure in cyber space is significantly difficult. Unlike conventional attacks, cyberattacks are fast and inexpensive, with ambiguous sources of origin. That is why a serious study deterring cyberattacks against critical infrastructure is necessary. Although the U.S. government is aware of the dangers posed by cyberattacks against its critical infrastructure, it does not have a well-developed strategy for deterring them. This thesis analyzes current U.S. cyber deterrence strategies and explores the feasibility of deterring cyberattacks against U.S. critical infrastructure.

I. INTRODUCTION * A. RESEARCH QUESTION * B. PROBLEM DESCRIPTION AND SIGNIFICANCE * C. LITERATURE REVIEW * 1. Protecting Critical Infrastructure * 2. Cyber Deterrence * D. METHODOLOGY * E. THESIS OVERVIEW * II. CYBERATTACKS ON CRITICAL INFRASTRUCTURE * A. INTRODUCTION * B. STUXNET * 1. Iran's Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * C. BOWMAN AVENUE DAM * 1. U.S. Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * D. SUMMARY * III. CONCLUSION * A. LESSONS LEARNED * 1. Deterrence Policy and Deterrence Failure * 2. Attribution * 3. Retaliation * B. IMPLICATIONS FOR U.S. POLICY * C. CAN THE UNITED STATES DETER CYBERATTACKS ON ITS CRITICAL INFRASTRUCTURE? * D. RECOMMENDATIONS FOR FUTURE RESEARCH

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public. Those services are essential to U.S. security, economy, and health. Many documents, some dating back to the Cold War era, examine deterrence strategies to defend critical infrastructure against physical attacks, but literature regarding deterrence against cyberattacks on critical infrastructure is minimal. Deterrence is most important when defense is difficult, and defending critical infrastructure in cyber space is significantly difficult. Unlike conventional attacks, cyberattacks are fast and inexpensive, with ambiguous sources of origin. That is why a serious study deterring cyberattacks against critical infrastructure is necessary. Although the U.S. government is aware of the dangers posed by cyberattacks against its critical infrastructure, it does not have a well-developed strategy for deterring them. This thesis analyzes current U.S. cyber deterrence strategies and explores the feasibility of deterring cyberattacks against U.S. critical infrastructure.

I. INTRODUCTION * A. RESEARCH QUESTION * B. PROBLEM DESCRIPTION AND SIGNIFICANCE * C. LITERATURE REVIEW * 1. Protecting Critical Infrastructure * 2. Cyber Deterrence * D. METHODOLOGY * E. THESIS OVERVIEW * II. CYBERATTACKS ON CRITICAL INFRASTRUCTURE * A. INTRODUCTION * B. STUXNET * 1. Iran's Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * C. BOWMAN AVENUE DAM * 1. U.S. Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * D. SUMMARY * III. CONCLUSION * A. LESSONS LEARNED * 1. Deterrence Policy and Deterrence Failure * 2. Attribution * 3. Retaliation * B. IMPLICATIONS FOR U.S. POLICY * C. CAN THE UNITED STATES DETER CYBERATTACKS ON ITS CRITICAL INFRASTRUCTURE? * D. RECOMMENDATIONS FOR FUTURE RESEARCH

More books from Progressive Management

Cover of the book Naval Air Training: Air to Air Intercept Procedures Workbook - Pursuit, Radar, Displays and Flight Path Visualization, Intercept Geometry Fundamentals, Counterturn, Missiles by Progressive Management
Cover of the book How China Wins: A Case Study of the 1979 Sino-Vietnamese War - Analysis of the Parallels and Differences Between the Chinese Communist Party Under Deng Xiaoping That Waged War and Today's CCP by Progressive Management
Cover of the book The Revolutionary War (War of American Independence): Timeline of the American Revolution, Featuring the Content of Original Documents by George Washington, Continental Congress, Thomas Paine, Others by Progressive Management
Cover of the book Federal Bureau of Investigation (FBI) Handbook of Forensic Services, 2007 Edition - Crime Scene Forensics and Criminal Evidence Collection and Handling Procedures by Progressive Management
Cover of the book Interagency Standards for Fire and Fire Aviation Operations: Federal Wildland Fire Management Policy, Safety, Risk Management, Chemicals and Delivery Systems, Firefighting Training and Equipment by Progressive Management
Cover of the book Terrorism and WMD in the Contemporary Operational Environment (U.S. Army TRADOC G2 Handbook 1.04) - CBRN Threat, Weapons of Mass Destruction, Chemical, Biological, Nuclear, Dirty Bomb by Progressive Management
Cover of the book Iran in Perspective: Orientation Guide, Farsi and Baluchi Cultural Orientation: Islamic Revolution, Post-Khomeini, Nucear Weapons Stand-off, Geography, History, Military, Religion, Holy Sites, Qom by Progressive Management
Cover of the book 21st Century Wegener’s Granulomatosis Sourcebook: Clinical Data for Patients, Families, and Physicians - Diagnosis, Testing, Treatment, Drugs, Vasculitis and Related Autoimmune Diseases by Progressive Management
Cover of the book FEMA Document Series: Federal Guidelines for Dam Safety: Emergency Action Planning for Dam Owners by Progressive Management
Cover of the book Providing Comfort to Iraq's Kurds: Forming a De Facto Relationship - History of Kurds, Anfal Campaign, Iran-Iraq War, Persian Gulf War, International Relations Framework, Kurdistan Democratic Party by Progressive Management
Cover of the book Ivory Coast (Cote d'Ivoire): Federal Research Study with Comprehensive Information, History, and Analysis - Abidjan, Ivorian Military, Government and Politics, Economy, Population, Social Issues by Progressive Management
Cover of the book Impact of Foreign Ownership on the Civil Reserve Air Fleet (CRAF) - Augmenting Military Airlift by Commercial Air Carriers in Emergencies, Criticality, USTRANSCOM Requirements, Restrictions, Concerns by Progressive Management
Cover of the book 21st Century Adult Cancer Sourcebook: Islet Cell Tumors (Endocrine Pancreas) including Gastrinoma, Insulinoma, Glucagonoma, VIPoma, and Somatostatinoma by Progressive Management
Cover of the book NASA's Nuclear Frontier: The Plum Brook Reactor Facility - Research into Nuclear Propulsion for Rockets and Aircraft by Progressive Management
Cover of the book Afghanistan Brigade Combat Team (BCT) - Provincial Reconstruction Team (PRT) Unity of Effort Reference Guide, Observations, Insights, and Lessons by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy