Cyberterrorism After Stuxnet Cyberterrorism After Stuxnet

Cyberterrorism After Stuxnet

    • $0.99
    • $0.99

Publisher Description

Terrorists are known to use the Internet for communications, planning, recruitment, propaganda, and reconnaissance. They have shown interest in carrying out cyberattacks on U.S. critical infrastructures, although no such serious attacks are known publicly to have occurred. The discovery of the Stuxnet malware in July 2010, and its analysis over the next several months, was widely believed to have been a landmark event in cybersecurity, because it showed that cyberattacks against industrial control systems, hypothesized for a long time, are actually possible. After Stuxnet, there were public concerns that terrorists might be encouraged to acquire capabilities for similar cyberattacks. 

This monograph examines cyberterrorism before and after Stuxnet by addressing questions of: 

1. Motive—Are terrorists interested in launching cyberattacks against U.S. critical infrastructures? 

2. Means—Are terrorists building capabilities and skills for cyberattacks? 

3. Opportunity—How vulnerable are U.S. critical infrastructures? 


It is noted that no serious cyberterrorism attacks have occurred after Stuxnet. This can be explained from a cost-benefit perspective that has not changed since Stuxnet. It can be argued that U.S. policies can really address vulnerabilities only by strengthening defenses of critical infrastructures.

GENRE
Computers & Internet
RELEASED
2015
August 23
LANGUAGE
EN
English
LENGTH
31
Pages
PUBLISHER
Didactic Press
SELLER
Joshua D. Cureton
SIZE
227.1
KB

More Books Like This

Cyber Security Cyber Security
2013
A Cyberworm that Knows No Boundaries A Cyberworm that Knows No Boundaries
2011
Blackhatonomics Blackhatonomics
2012
Cyber Warfare Cyber Warfare
2013
Time Sensitivity in Cyberweapon Reusability: Stealth as a Critical Attribute Allowing Weaponized Software Code to be Reused, Survivability That Delays Detection to Prevent Vulnerability Patching Time Sensitivity in Cyberweapon Reusability: Stealth as a Critical Attribute Allowing Weaponized Software Code to be Reused, Survivability That Delays Detection to Prevent Vulnerability Patching
2018
Surviving Cyberwar Surviving Cyberwar
2010

More Books by Thomas M. Chen

Terrorism Online Terrorism Online
2015
Cyberterrorism Cyberterrorism
2014
Forward Error Correction Based On Algebraic-Geometric Theory Forward Error Correction Based On Algebraic-Geometric Theory
2014