Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, History, Military, Strategy
Cover of the book Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370919666
Publisher: Progressive Management Publication: June 24, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370919666
Publisher: Progressive Management
Publication: June 24, 2018
Imprint: Smashwords Edition
Language: English

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public. Those services are essential to U.S. security, economy, and health. Many documents, some dating back to the Cold War era, examine deterrence strategies to defend critical infrastructure against physical attacks, but literature regarding deterrence against cyberattacks on critical infrastructure is minimal. Deterrence is most important when defense is difficult, and defending critical infrastructure in cyber space is significantly difficult. Unlike conventional attacks, cyberattacks are fast and inexpensive, with ambiguous sources of origin. That is why a serious study deterring cyberattacks against critical infrastructure is necessary. Although the U.S. government is aware of the dangers posed by cyberattacks against its critical infrastructure, it does not have a well-developed strategy for deterring them. This thesis analyzes current U.S. cyber deterrence strategies and explores the feasibility of deterring cyberattacks against U.S. critical infrastructure.

I. INTRODUCTION * A. RESEARCH QUESTION * B. PROBLEM DESCRIPTION AND SIGNIFICANCE * C. LITERATURE REVIEW * 1. Protecting Critical Infrastructure * 2. Cyber Deterrence * D. METHODOLOGY * E. THESIS OVERVIEW * II. CYBERATTACKS ON CRITICAL INFRASTRUCTURE * A. INTRODUCTION * B. STUXNET * 1. Iran's Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * C. BOWMAN AVENUE DAM * 1. U.S. Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * D. SUMMARY * III. CONCLUSION * A. LESSONS LEARNED * 1. Deterrence Policy and Deterrence Failure * 2. Attribution * 3. Retaliation * B. IMPLICATIONS FOR U.S. POLICY * C. CAN THE UNITED STATES DETER CYBERATTACKS ON ITS CRITICAL INFRASTRUCTURE? * D. RECOMMENDATIONS FOR FUTURE RESEARCH

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public. Those services are essential to U.S. security, economy, and health. Many documents, some dating back to the Cold War era, examine deterrence strategies to defend critical infrastructure against physical attacks, but literature regarding deterrence against cyberattacks on critical infrastructure is minimal. Deterrence is most important when defense is difficult, and defending critical infrastructure in cyber space is significantly difficult. Unlike conventional attacks, cyberattacks are fast and inexpensive, with ambiguous sources of origin. That is why a serious study deterring cyberattacks against critical infrastructure is necessary. Although the U.S. government is aware of the dangers posed by cyberattacks against its critical infrastructure, it does not have a well-developed strategy for deterring them. This thesis analyzes current U.S. cyber deterrence strategies and explores the feasibility of deterring cyberattacks against U.S. critical infrastructure.

I. INTRODUCTION * A. RESEARCH QUESTION * B. PROBLEM DESCRIPTION AND SIGNIFICANCE * C. LITERATURE REVIEW * 1. Protecting Critical Infrastructure * 2. Cyber Deterrence * D. METHODOLOGY * E. THESIS OVERVIEW * II. CYBERATTACKS ON CRITICAL INFRASTRUCTURE * A. INTRODUCTION * B. STUXNET * 1. Iran's Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * C. BOWMAN AVENUE DAM * 1. U.S. Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * D. SUMMARY * III. CONCLUSION * A. LESSONS LEARNED * 1. Deterrence Policy and Deterrence Failure * 2. Attribution * 3. Retaliation * B. IMPLICATIONS FOR U.S. POLICY * C. CAN THE UNITED STATES DETER CYBERATTACKS ON ITS CRITICAL INFRASTRUCTURE? * D. RECOMMENDATIONS FOR FUTURE RESEARCH

More books from Progressive Management

Cover of the book Afghanistan: Provincial Reconstruction Team Observations, Insights, and Lessons - Comprehensive Guide to Each of the Thirty-four Afghan Provinces by Progressive Management
Cover of the book U.S. Army Medical Correspondence Course: Cardiac Rhythm Interpretation - Electrocardiogram, EKG, Dysrhythmia, Electrophysiology, Rhythms/Heart Blocks by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Basic Cold Weather Field Manual - FM 31-70 (Value-Added Professional Format Series) by Progressive Management
Cover of the book 2017 Cyber Attack Deterrence: Defense Science Board (DSB) Task Force on Cyber Deterrence – Developing Scalable Strategic Offensive Cyber Capabilities, Resilience of U.S. Nuclear Weapons, Attribution by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: The Operations Process - 2012 Army Doctrine Reference Publication ADRP 5-0, Planning, Preparing, Executing (Professional Format Series) by Progressive Management
Cover of the book Art of War Paper: Operations at the Border - Efforts to Disrupt Insurgent Safe-Havens, Dhofar, Oman, Insurgency, Counterinsurgency by Progressive Management
Cover of the book Deterrence vs. Assurance: The U.S. Naval Presence in the Persian Gulf - Strategy about Iranian Aggression in Strait of Hormuz, Role of Saudi Arabia, Warship Deterrence May Be Misguided and Unnecessary by Progressive Management
Cover of the book 21st Century Charcot-Marie-Tooth Disorder (CMT) Sourcebook: Clinical Data for Patients, Families, and Physicians - Hereditary Motor and Sensory Neuropathy (HMSN) by Progressive Management
Cover of the book 21st Century NBC WMD CBRN Weapons and Terrorism: Mass Fatality Management for Incidents Involving Weapons of Mass Destruction - Capstone Document from the U.S. Army and Department of Justice by Progressive Management
Cover of the book Naval Aviation Vision: Sea Control, Maritime Security, Power Projection, Deterrence, Humanitarian Assistance, Century of Excellence, Future, Transformation Roadmaps, Forcenet by Progressive Management
Cover of the book Essential Guide to the Federal Deposit Insurance Corporation (FDIC) - Reports and Plans, Deposit Insurance Coverage, Foreclosure Options, Overdraft Fees, Financial Information Privacy by Progressive Management
Cover of the book Essential Guide to Military Ethics: Army Professionalism, The Military Ethic, and Officership in the 21st Century - McMaster Speeches – Fort Leavenworth Symposium, Professional Ethic and the State by Progressive Management
Cover of the book Russia: Federal Research Study and Country Profile with Comprehensive Information, History, and Analysis - East Slavs, Empire, Communism, Ethnic and Cultural Setting, Economy, Military by Progressive Management
Cover of the book 21st Century FEMA Study Course: The Role of Voluntary Agencies in Emergency Management (IS-288) - NVOAD National Voluntary Organizations Active in Disaster by Progressive Management
Cover of the book NSA Secrets Declassified: Speech Coding, Cipher Disk, German Cipher Machines in World War II, Women in Cryptology, Electronic Intelligence (ELINT), Missile and Space Intelligence, Secure Voice Coding by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy