Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, History, Military, Strategy
Cover of the book Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services by Progressive Management, Progressive Management
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Progressive Management ISBN: 9781370919666
Publisher: Progressive Management Publication: June 24, 2018
Imprint: Smashwords Edition Language: English
Author: Progressive Management
ISBN: 9781370919666
Publisher: Progressive Management
Publication: June 24, 2018
Imprint: Smashwords Edition
Language: English

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public. Those services are essential to U.S. security, economy, and health. Many documents, some dating back to the Cold War era, examine deterrence strategies to defend critical infrastructure against physical attacks, but literature regarding deterrence against cyberattacks on critical infrastructure is minimal. Deterrence is most important when defense is difficult, and defending critical infrastructure in cyber space is significantly difficult. Unlike conventional attacks, cyberattacks are fast and inexpensive, with ambiguous sources of origin. That is why a serious study deterring cyberattacks against critical infrastructure is necessary. Although the U.S. government is aware of the dangers posed by cyberattacks against its critical infrastructure, it does not have a well-developed strategy for deterring them. This thesis analyzes current U.S. cyber deterrence strategies and explores the feasibility of deterring cyberattacks against U.S. critical infrastructure.

I. INTRODUCTION * A. RESEARCH QUESTION * B. PROBLEM DESCRIPTION AND SIGNIFICANCE * C. LITERATURE REVIEW * 1. Protecting Critical Infrastructure * 2. Cyber Deterrence * D. METHODOLOGY * E. THESIS OVERVIEW * II. CYBERATTACKS ON CRITICAL INFRASTRUCTURE * A. INTRODUCTION * B. STUXNET * 1. Iran's Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * C. BOWMAN AVENUE DAM * 1. U.S. Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * D. SUMMARY * III. CONCLUSION * A. LESSONS LEARNED * 1. Deterrence Policy and Deterrence Failure * 2. Attribution * 3. Retaliation * B. IMPLICATIONS FOR U.S. POLICY * C. CAN THE UNITED STATES DETER CYBERATTACKS ON ITS CRITICAL INFRASTRUCTURE? * D. RECOMMENDATIONS FOR FUTURE RESEARCH

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public. Those services are essential to U.S. security, economy, and health. Many documents, some dating back to the Cold War era, examine deterrence strategies to defend critical infrastructure against physical attacks, but literature regarding deterrence against cyberattacks on critical infrastructure is minimal. Deterrence is most important when defense is difficult, and defending critical infrastructure in cyber space is significantly difficult. Unlike conventional attacks, cyberattacks are fast and inexpensive, with ambiguous sources of origin. That is why a serious study deterring cyberattacks against critical infrastructure is necessary. Although the U.S. government is aware of the dangers posed by cyberattacks against its critical infrastructure, it does not have a well-developed strategy for deterring them. This thesis analyzes current U.S. cyber deterrence strategies and explores the feasibility of deterring cyberattacks against U.S. critical infrastructure.

I. INTRODUCTION * A. RESEARCH QUESTION * B. PROBLEM DESCRIPTION AND SIGNIFICANCE * C. LITERATURE REVIEW * 1. Protecting Critical Infrastructure * 2. Cyber Deterrence * D. METHODOLOGY * E. THESIS OVERVIEW * II. CYBERATTACKS ON CRITICAL INFRASTRUCTURE * A. INTRODUCTION * B. STUXNET * 1. Iran's Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * C. BOWMAN AVENUE DAM * 1. U.S. Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * D. SUMMARY * III. CONCLUSION * A. LESSONS LEARNED * 1. Deterrence Policy and Deterrence Failure * 2. Attribution * 3. Retaliation * B. IMPLICATIONS FOR U.S. POLICY * C. CAN THE UNITED STATES DETER CYBERATTACKS ON ITS CRITICAL INFRASTRUCTURE? * D. RECOMMENDATIONS FOR FUTURE RESEARCH

More books from Progressive Management

Cover of the book War in the Shallows: U.S. Navy Coastal and Riverine Warfare in Vietnam 1965-1968 - Swift Boats, Vung Ro Incident, Arnheiter Affair, Game Warden, Mining, Trawler Intercepts, Tet, Task Force Clearwater by Progressive Management
Cover of the book The Rise of China in Asia: Security Implications - Senkaku Islands, Taiwan, North Korea on the Brink, Chinese Threat to Neighbors, India's Response to China, South China Sea by Progressive Management
Cover of the book Tailored Deterrence: Influencing States and Groups of Concern - Case Studies of Russia, China in the Taiwan Strait, Nuclear-armed Iran, North Korea, Triad, Hussein and Gulf War Lessons, Zero Nukes by Progressive Management
Cover of the book A Pattern for Joint Operations: World War II Close Air Support, North Africa - Weapons, Doctrine, Aircraft, Planning, TORCH Landings, Offensive Against Tunisia, Kasserine and a New Look by Progressive Management
Cover of the book A New Beginning: Speech by President Barack Obama in Cairo, Egypt, June 2009 - Islam, Muslims, Finding Common Ground in the Middle East - plus American Response to Egyptian Uprising by Progressive Management
Cover of the book Aspects of Military Leadership: Ethics, Law, and Spirituality, Examples from Afghanistan, COIN Operations, Irregular Warfare, Holocaust, Rules of Engagement, Loyalty to Comrades, Religious Factor by Progressive Management
Cover of the book The Operational Impacts of Joint Seabasing (JSB) - Mobile Offshore Bases, Operational Environment, Deployment Vulnerabilities, Air Ports Of Debarkation (APOD), Sea Power 21, Marine Corps by Progressive Management
Cover of the book Marines in the Korean War Commemorative Series: Train Wreckers and Ghost Killers - Allied Marines in the Korean War, Commandos, Admiral Joy, Drysdale, British Royal Marines by Progressive Management
Cover of the book Rise of the Fighter Generals: The Problem of Air Force Leadership 1945-1982 - Twining, LeMay, Norstad, Jones, Davis, McPeak, Arnold, Doolittle, Momyer by Progressive Management
Cover of the book 21st Century U.S. Military Manuals: U.S. Marine Corps (USMC) A Book on Books - Professional Reading Lists, Read to Lead in Today's Corps (Value-Added Professional Format Series) by Progressive Management
Cover of the book 2014 U.S. Navy Report: Sexual Harassment and Inappropriate Behavior in the Blue Angels Navy Flight Demonstration Squadron Creating a Hostile Work Environment by Progressive Management
Cover of the book Reading the Enemy's Mail: Origins and Development of U.S. Army Tactical Radio Intelligence in World War II, European Theater of Operations - Wartime Operations, Direction Finding Equipment by Progressive Management
Cover of the book 21st Century Peacekeeping and Stability Operations Institute (PKSOI) Papers - Defining Command, Leadership, and Management Success Factors Within Stability Operations by Progressive Management
Cover of the book National Policies for Military Unmanned Systems that Implement Joint Fires Missions: Aircraft Systems, Armed Drones, Research Priorities, Historical Analogies, Strategic Options for Counterterrorism by Progressive Management
Cover of the book National Defense Intelligence College Paper: Beneath the Surface - Intelligence Preparation of the Battlespace for Counterterrorism - bin Laden, al-Qaida, Jihad, Horn of Africa, Hezbollah by Progressive Management
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy