Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, History, Military, Strategy
Cover of the book Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370919666
Publisher: Progressive Management Publication: June 24, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370919666
Publisher: Progressive Management
Publication: June 24, 2018
Imprint: Smashwords Edition
Language: English

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public. Those services are essential to U.S. security, economy, and health. Many documents, some dating back to the Cold War era, examine deterrence strategies to defend critical infrastructure against physical attacks, but literature regarding deterrence against cyberattacks on critical infrastructure is minimal. Deterrence is most important when defense is difficult, and defending critical infrastructure in cyber space is significantly difficult. Unlike conventional attacks, cyberattacks are fast and inexpensive, with ambiguous sources of origin. That is why a serious study deterring cyberattacks against critical infrastructure is necessary. Although the U.S. government is aware of the dangers posed by cyberattacks against its critical infrastructure, it does not have a well-developed strategy for deterring them. This thesis analyzes current U.S. cyber deterrence strategies and explores the feasibility of deterring cyberattacks against U.S. critical infrastructure.

I. INTRODUCTION * A. RESEARCH QUESTION * B. PROBLEM DESCRIPTION AND SIGNIFICANCE * C. LITERATURE REVIEW * 1. Protecting Critical Infrastructure * 2. Cyber Deterrence * D. METHODOLOGY * E. THESIS OVERVIEW * II. CYBERATTACKS ON CRITICAL INFRASTRUCTURE * A. INTRODUCTION * B. STUXNET * 1. Iran's Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * C. BOWMAN AVENUE DAM * 1. U.S. Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * D. SUMMARY * III. CONCLUSION * A. LESSONS LEARNED * 1. Deterrence Policy and Deterrence Failure * 2. Attribution * 3. Retaliation * B. IMPLICATIONS FOR U.S. POLICY * C. CAN THE UNITED STATES DETER CYBERATTACKS ON ITS CRITICAL INFRASTRUCTURE? * D. RECOMMENDATIONS FOR FUTURE RESEARCH

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public. Those services are essential to U.S. security, economy, and health. Many documents, some dating back to the Cold War era, examine deterrence strategies to defend critical infrastructure against physical attacks, but literature regarding deterrence against cyberattacks on critical infrastructure is minimal. Deterrence is most important when defense is difficult, and defending critical infrastructure in cyber space is significantly difficult. Unlike conventional attacks, cyberattacks are fast and inexpensive, with ambiguous sources of origin. That is why a serious study deterring cyberattacks against critical infrastructure is necessary. Although the U.S. government is aware of the dangers posed by cyberattacks against its critical infrastructure, it does not have a well-developed strategy for deterring them. This thesis analyzes current U.S. cyber deterrence strategies and explores the feasibility of deterring cyberattacks against U.S. critical infrastructure.

I. INTRODUCTION * A. RESEARCH QUESTION * B. PROBLEM DESCRIPTION AND SIGNIFICANCE * C. LITERATURE REVIEW * 1. Protecting Critical Infrastructure * 2. Cyber Deterrence * D. METHODOLOGY * E. THESIS OVERVIEW * II. CYBERATTACKS ON CRITICAL INFRASTRUCTURE * A. INTRODUCTION * B. STUXNET * 1. Iran's Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * C. BOWMAN AVENUE DAM * 1. U.S. Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * D. SUMMARY * III. CONCLUSION * A. LESSONS LEARNED * 1. Deterrence Policy and Deterrence Failure * 2. Attribution * 3. Retaliation * B. IMPLICATIONS FOR U.S. POLICY * C. CAN THE UNITED STATES DETER CYBERATTACKS ON ITS CRITICAL INFRASTRUCTURE? * D. RECOMMENDATIONS FOR FUTURE RESEARCH

More books from Progressive Management

Cover of the book U.S. Army Medical Correspondence Course: Cardiac Rhythm Interpretation - Electrocardiogram, EKG, Dysrhythmia, Electrophysiology, Rhythms/Heart Blocks by Progressive Management
Cover of the book Attribution in Influence: Relative Power and the Use of Attribution - Military Psychological Operations (PSYOP) and Deception, Case Studies of U.S. in World War II and Vietnam, and Russia in Crimea by Progressive Management
Cover of the book NASA Space Technology Report: Low Cost Robotic Lunar Lander (COMPASS Final Report), Launch Options including SpaceX, Subsystems, Costs and Risks by Progressive Management
Cover of the book Praetorian STARShip: The Untold Story of the Combat Talon Special Forces Operations - Infiltration, Exfiltration, Surface to Air Recovery System, Fulton Recovery, Iranian Rescue, Vietnam, Desert Storm by Progressive Management
Cover of the book NSA Secrets Declassified: The History of Traffic Analysis: World War I - Vietnam, Signals Intelligence (SIGINT), Communications Intelligence (COMMINT), World War II, Cold War, Cryptanalysis by Progressive Management
Cover of the book 2015 Complete Guide to Pollinator Health: Honey Bees, Monarch Butterflies, New Strategies for Colony Collapse Disorder (CCD), Varroa Mite, Pesticides, Domestic and Global, Federal Land Practices by Progressive Management
Cover of the book Gulf War Logistics: Theory Into Practice - Desert Shield and Storm, Army Logistics from Vietnam to AirLand Battle, Ramifications of Schwarzkopf's Decision, Tactical Airlift, Ground Transportation by Progressive Management
Cover of the book The U.S. Navy and the Cuban Missile Crisis: Questions about Kennedy and Schlesinger Accounts, Intelligence from Communications Intercepts Before Spy Photographs, Naval Operations, Navy ASW Operations by Progressive Management
Cover of the book U.S. Marines in Iraq, 2004-2005: Into the Fray - U.S. Marines in the Global War on Terrorism, Al-Anbar, Al-Fallujah Battles, Protecting Self Rule and the Emerging Iraq, Chronology of Events by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: Problems in Desert Warfare and Troop Construction in the Middle East Marine Corps Field Manuals (Value-Added Professional Format Series) by Progressive Management
Cover of the book Programmatic Integration of Cyber into the Institutional Domain of Leader Development: Cyberspace and Computer Curriculum in Army Learning Institutions, Comparing Cyber to Armor or Aviation by Progressive Management
Cover of the book American Military History: A Selected Bibliography - Doctrine, Strategy, Tactics, Profiles of Command, Law of War, Lessons Learned, Rules of Engagement, Transformation and Reform, Study of History by Progressive Management
Cover of the book Space Power Integration: Perspectives from Space Weapons Officers, Counterspace Operations, Space Warfare, Air and Space Power by Progressive Management
Cover of the book 2012 Essential Guide to Greece: Authoritative Coverage of Eurozone Crisis and Greek Economic Problems, Overview of All Aspects of the Nation and its People by Progressive Management
Cover of the book A European Identity: Too Much to Hope For? Far-Right Populist Parties, British UKIP and German AfD Parties, Potential for Catastrophic European Union (EU) Failure and Issues for U.S. Security by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy