Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, History, Military, Strategy
Cover of the book Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370919666
Publisher: Progressive Management Publication: June 24, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370919666
Publisher: Progressive Management
Publication: June 24, 2018
Imprint: Smashwords Edition
Language: English

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public. Those services are essential to U.S. security, economy, and health. Many documents, some dating back to the Cold War era, examine deterrence strategies to defend critical infrastructure against physical attacks, but literature regarding deterrence against cyberattacks on critical infrastructure is minimal. Deterrence is most important when defense is difficult, and defending critical infrastructure in cyber space is significantly difficult. Unlike conventional attacks, cyberattacks are fast and inexpensive, with ambiguous sources of origin. That is why a serious study deterring cyberattacks against critical infrastructure is necessary. Although the U.S. government is aware of the dangers posed by cyberattacks against its critical infrastructure, it does not have a well-developed strategy for deterring them. This thesis analyzes current U.S. cyber deterrence strategies and explores the feasibility of deterring cyberattacks against U.S. critical infrastructure.

I. INTRODUCTION * A. RESEARCH QUESTION * B. PROBLEM DESCRIPTION AND SIGNIFICANCE * C. LITERATURE REVIEW * 1. Protecting Critical Infrastructure * 2. Cyber Deterrence * D. METHODOLOGY * E. THESIS OVERVIEW * II. CYBERATTACKS ON CRITICAL INFRASTRUCTURE * A. INTRODUCTION * B. STUXNET * 1. Iran's Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * C. BOWMAN AVENUE DAM * 1. U.S. Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * D. SUMMARY * III. CONCLUSION * A. LESSONS LEARNED * 1. Deterrence Policy and Deterrence Failure * 2. Attribution * 3. Retaliation * B. IMPLICATIONS FOR U.S. POLICY * C. CAN THE UNITED STATES DETER CYBERATTACKS ON ITS CRITICAL INFRASTRUCTURE? * D. RECOMMENDATIONS FOR FUTURE RESEARCH

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public. Those services are essential to U.S. security, economy, and health. Many documents, some dating back to the Cold War era, examine deterrence strategies to defend critical infrastructure against physical attacks, but literature regarding deterrence against cyberattacks on critical infrastructure is minimal. Deterrence is most important when defense is difficult, and defending critical infrastructure in cyber space is significantly difficult. Unlike conventional attacks, cyberattacks are fast and inexpensive, with ambiguous sources of origin. That is why a serious study deterring cyberattacks against critical infrastructure is necessary. Although the U.S. government is aware of the dangers posed by cyberattacks against its critical infrastructure, it does not have a well-developed strategy for deterring them. This thesis analyzes current U.S. cyber deterrence strategies and explores the feasibility of deterring cyberattacks against U.S. critical infrastructure.

I. INTRODUCTION * A. RESEARCH QUESTION * B. PROBLEM DESCRIPTION AND SIGNIFICANCE * C. LITERATURE REVIEW * 1. Protecting Critical Infrastructure * 2. Cyber Deterrence * D. METHODOLOGY * E. THESIS OVERVIEW * II. CYBERATTACKS ON CRITICAL INFRASTRUCTURE * A. INTRODUCTION * B. STUXNET * 1. Iran's Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * C. BOWMAN AVENUE DAM * 1. U.S. Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * D. SUMMARY * III. CONCLUSION * A. LESSONS LEARNED * 1. Deterrence Policy and Deterrence Failure * 2. Attribution * 3. Retaliation * B. IMPLICATIONS FOR U.S. POLICY * C. CAN THE UNITED STATES DETER CYBERATTACKS ON ITS CRITICAL INFRASTRUCTURE? * D. RECOMMENDATIONS FOR FUTURE RESEARCH

More books from Progressive Management

Cover of the book Preparing for the Future: The Regional Alignment of U.S. Army Brigade Combat Teams (BCTs) - Capacity Building, Alliance Building, Lessons Learned, Joint Doctrine, Strategy and Tactics by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Public Affairs Tactics, Techniques and Procedures Field Manual - FM 3-61.1 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Commander's Guide to Support Operations Among Weaponized Displaced Persons, Refugees, and Evacuees, Purposeful Introduction of Biologically Infected Persons or CBRNE Casualties, WMD Threat at Camps by Progressive Management
Cover of the book The Final Status of Kosovo and its Implications for Balkan Stability: Scenarios, Post-Conflict Society, Security, Governance, Well-being, Justice and Reconciliation by Progressive Management
Cover of the book The Evolving Arctic: Current State of U.S. Arctic Policy - Strategies of Other Arctic Nations, Russia, Canada, Denmark, Norway, Sweden, Finland, Iceland, Icebreakers, UNCLOS, SAR Assets by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Multiservice Procedures for Humanitarian Assistance Operations - HA - FM 100-23-1 (Value-Added Professional Format Series) by Progressive Management
Cover of the book Nuclear Weapons Security: Nuclear Counterterrorism, Nuclear Explosives Control, Safety Program, Personnel Reliability Program, Prevention of Deliberate Unauthorized Use, DOD Response to IND Incidents by Progressive Management
Cover of the book United States Army in World War II: The European Theater of Operations: The Supreme Command - SHAEF, D-Day Invasion, Pursuit to the Seine, Rhine, Fighting in the North, Drive to the Elbe, Surrender by Progressive Management
Cover of the book 2014 Essential Guide to the Ukraine and the Crisis with Russia: Battle for Kiev, Ukraine Military, Putin's Intervention, Yanukovych, Crimea, Sevastopol and Russian Fleet, Orange Revolution by Progressive Management
Cover of the book 21st Century Cellulosic Ethanol, Biomass, and Biofuels: Wood Chips, Stalks, Switchgrass, Plant Products, Feedstocks, Cellulose Conversion Processes, Research Plans by Progressive Management
Cover of the book Chinese Energy Security: The Myth of the PLAN's Frontline Status - Chinese Navy, Maritime Security, Spratly Islands, Sino-Japanese Tension, Senkaku Islands, East China Sea, Naval Blockade by Progressive Management
Cover of the book Field Artillery and the Combined Arms Team: Case for Continued Relevance of American Fire Support – Lessons Learned from World War II Battle of Kasserine Pas and Operation Husky, Operation Anaconda by Progressive Management
Cover of the book 21st Century U.S. Military Documents: Air Force F-35 Lightning Fighter Aircraft - Operations Procedures, Aircrew Evaluation Criteria, Aircrew Training Flying Operations by Progressive Management
Cover of the book Arctic Operations and the Northwest Passage: Department of Defense (DOD) Report to Congress on the Effect of Climate Change, Arctic Warming, National Security, Infrastructure, Icebreakers by Progressive Management
Cover of the book Joint Doctrine Encyclopedia: Part Two: Definitions of Critical Joint Force Defense Department Terms, From Joint Force Surgeon to Worldwide Military Command and Control System by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy