Cyberterrorism After Stuxnet - Terrorist Cyberattacks, Distributed Denial of Service (DDoS), Motives, Critical U.S. Infrastructure Vulnerabilities, al-Qaeda Computer Capability, PC Attacks

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Social & Cultural Studies, Political Science
Cover of the book Cyberterrorism After Stuxnet - Terrorist Cyberattacks, Distributed Denial of Service (DDoS), Motives, Critical U.S. Infrastructure Vulnerabilities, al-Qaeda Computer Capability, PC Attacks by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781310219450
Publisher: Progressive Management Publication: January 11, 2015
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781310219450
Publisher: Progressive Management
Publication: January 11, 2015
Imprint: Smashwords Edition
Language: English

Public government statements have cited cyber-attacks by terrorists as a major concern for national security. To date, no large-scale cyber-terrorist attack has been observed, but terrorists are known to be using the Internet for various routine purposes. The discovery of Stuxnet in 2010 was a milestone in the arena of cybersecurity because, although a malware attack on industrial control systems was long believed to be theoretically possible, it was different to see malware used in reality to cause real physical damage. Stuxnet demonstrated that a sufficiently determined adversary with sufficient resources might be able to damage U.S. critical infrastructure physically through a cyber attack. Did Stuxnet change the threat of cyber-terrorism?

This monograph examines cyberterrorism before and after Stuxnet by addressing three questions: 1) Motive—Are terrorists interested in launching cyber-attacks against U.S. critical infrastructures? 2) Means —Are terrorists building capabilities and skills for cyberattacks? and, 3) Opportunity—How vulnerable are U.S. critical infrastructures? Answers to these questions give a characterization of the post-Stuxnet cyberterrorism threat. The next question is why a major cyber-terrorist attack has not happened yet; this is explained from a cost-benefit perspective. Although cyberterrorism may not be an imminent threat, there are reasons to be concerned about the long-term threat and inevitability of cyberattacks. It is important to assess frequently the threat landscape and current government policies for enhancing the protection of national infrastructures.

Terrorists are known to use the Internet for communications, planning, recruitment, propaganda, and reconnaissance. They have shown interest in carrying out cyberattacks on U.S. critical infrastructures, although no such serious attacks are known publicly to have occurred. The discovery of the Stuxnet malware in July 2010, and its analysis over the next several months, was widely believed to have been a landmark event in cybersecurity, because it showed that cyberattacks against industrial control systems, hypothesized for a long time, are actually possible. After Stuxnet, there were public concerns that terrorists might be encouraged to acquire capabilities for similar cyberattacks.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Public government statements have cited cyber-attacks by terrorists as a major concern for national security. To date, no large-scale cyber-terrorist attack has been observed, but terrorists are known to be using the Internet for various routine purposes. The discovery of Stuxnet in 2010 was a milestone in the arena of cybersecurity because, although a malware attack on industrial control systems was long believed to be theoretically possible, it was different to see malware used in reality to cause real physical damage. Stuxnet demonstrated that a sufficiently determined adversary with sufficient resources might be able to damage U.S. critical infrastructure physically through a cyber attack. Did Stuxnet change the threat of cyber-terrorism?

This monograph examines cyberterrorism before and after Stuxnet by addressing three questions: 1) Motive—Are terrorists interested in launching cyber-attacks against U.S. critical infrastructures? 2) Means —Are terrorists building capabilities and skills for cyberattacks? and, 3) Opportunity—How vulnerable are U.S. critical infrastructures? Answers to these questions give a characterization of the post-Stuxnet cyberterrorism threat. The next question is why a major cyber-terrorist attack has not happened yet; this is explained from a cost-benefit perspective. Although cyberterrorism may not be an imminent threat, there are reasons to be concerned about the long-term threat and inevitability of cyberattacks. It is important to assess frequently the threat landscape and current government policies for enhancing the protection of national infrastructures.

Terrorists are known to use the Internet for communications, planning, recruitment, propaganda, and reconnaissance. They have shown interest in carrying out cyberattacks on U.S. critical infrastructures, although no such serious attacks are known publicly to have occurred. The discovery of the Stuxnet malware in July 2010, and its analysis over the next several months, was widely believed to have been a landmark event in cybersecurity, because it showed that cyberattacks against industrial control systems, hypothesized for a long time, are actually possible. After Stuxnet, there were public concerns that terrorists might be encouraged to acquire capabilities for similar cyberattacks.

More books from Progressive Management

Cover of the book Air Force Doctrine Document 3-10, Force Protection - Terrorism, Threat Levels, Risk Assessment and Management, Khobar Towers, Natural Disasters, Base Security Zone (BSZ) by Progressive Management
Cover of the book Air Force Doctrine Document 3-61: Public Affairs Operations - Strategic Communications, Tasks, DOD Principles of Information, PSYOPS by Progressive Management
Cover of the book The Soldier's Blue Book: Guide for Initial Entry Training Soldiers - Army as a Profession, BCT, OSUT, AIT, Appearance and Uniforms, Health, Discipline, First Duty Station, Physical Readiness, Army FM1 by Progressive Management
Cover of the book ISIS, Iraq, and Syria: Growing Strategic Threat of ISIL, Impact of U.S. Policy, Obama Strategy, Attacks on Ancient Communities and Religious Minorities, Force Authorization, Walid Phares, Experts by Progressive Management
Cover of the book General George S. Patton: Operational Art, Battle Command Lessons in the Second World War, Leadership Development, Battle of the Bulge, Many Faces, Air Power for Patton's Army in World War II by Progressive Management
Cover of the book Eliminating War by Eliminating Warriors: A Case Study in Costa Rica - Abolishing the Military and Army, Culture, Economic Evolution, Domestic Developments, External Threats, Historical Foundations by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: U.S. Coast Guard (USCG) Marine Safety Manual Volume One, Marine Safety Program, Environmental Response, Commercial Vessel Safety, Boating Safety by Progressive Management
Cover of the book Sustainment of Expeditionary Forces in the Pacific Theater During the Second World War: The Development of the Advanced Base and Mobile Base Programs and Their Relevance Today - Sea Basing, Logistics by Progressive Management
Cover of the book Apollo and America's Moon Landing Program: NASA Recommendations to Space-Faring Entities - How to Protect and Preserve the Historic and Scientific Value of U.S. Government Lunar Artifacts by Progressive Management
Cover of the book Operational Level Air Commanders: A Search for the Elements of Genius - Air Chief Marshal Hugh Dowding, Admiral Raymond Spruance, and General George Kenney, Battle of Britain, Midway, Papua Campaign by Progressive Management
Cover of the book Global Trends 2030: Alternative Worlds - American Intelligence Agency Report on the Megatrends, Gamechangers, and Black Swans of the Future, the Rise of China, Alternative World Scenarios by Progressive Management
Cover of the book James Webb Space Telescope Independent Review Board Report May 2018: New 2021 Launch Date and Substantially Higher Costs for Next Great Astronomy Observatory, Findings of Human Errors by Progressive Management
Cover of the book 21st Century VA Independent Study Course: Caring for War Wounded, Combat Injuries and Effects on Mental Health, Hazards of Deployment to Southwest Asia, Iraq (Veterans Health Issues Series) by Progressive Management
Cover of the book Delegitimizing al-Qaeda: A Jihad-Realist Approach - Salafist, Sharia, Takfir by Progressive Management
Cover of the book North Korea Issue Papers: Criminal Sovereignty and Illicit International Activities, Understanding the North Korea Problem: The Land of Lousy Options, plus China Policies and Controversies by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy