Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services

Deterring Cyberattacks on U.S. Critical Infrastructure: Case Studies of Iran and Stuxnet, Bowman Avenue Dam Attack, Attribution and Retaliation, Implications for U.S. Policy Protecting Vital Services

    • 8,99 €
    • 8,99 €

Publisher Description

This important December 2017 report has been professionally converted for accurate flowing-text e-book format reproduction.

Cyberattacks against critical infrastructure are not merely theoretical. Nations and private enterprises have come to understand that critical infrastructure can be attacked via cyberspace with serious repercussions. Critical infrastructure is vital to the United States because it provides power, water, transportation, and communication services to the American public. Those services are essential to U.S. security, economy, and health. Many documents, some dating back to the Cold War era, examine deterrence strategies to defend critical infrastructure against physical attacks, but literature regarding deterrence against cyberattacks on critical infrastructure is minimal. Deterrence is most important when defense is difficult, and defending critical infrastructure in cyber space is significantly difficult. Unlike conventional attacks, cyberattacks are fast and inexpensive, with ambiguous sources of origin. That is why a serious study deterring cyberattacks against critical infrastructure is necessary. Although the U.S. government is aware of the dangers posed by cyberattacks against its critical infrastructure, it does not have a well-developed strategy for deterring them. This thesis analyzes current U.S. cyber deterrence strategies and explores the feasibility of deterring cyberattacks against U.S. critical infrastructure.

I. INTRODUCTION * A. RESEARCH QUESTION * B. PROBLEM DESCRIPTION AND SIGNIFICANCE * C. LITERATURE REVIEW * 1. Protecting Critical Infrastructure * 2. Cyber Deterrence * D. METHODOLOGY * E. THESIS OVERVIEW * II. CYBERATTACKS ON CRITICAL INFRASTRUCTURE * A. INTRODUCTION * B. STUXNET * 1. Iran's Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * C. BOWMAN AVENUE DAM * 1. U.S. Deterrence Policy * 2. Did Deterrence Fail or Succeed? * 3. Attribution * 4. Retaliation * D. SUMMARY * III. CONCLUSION * A. LESSONS LEARNED * 1. Deterrence Policy and Deterrence Failure * 2. Attribution * 3. Retaliation * B. IMPLICATIONS FOR U.S. POLICY * C. CAN THE UNITED STATES DETER CYBERATTACKS ON ITS CRITICAL INFRASTRUCTURE? * D. RECOMMENDATIONS FOR FUTURE RESEARCH

GENRE
History
RELEASED
2018
24 June
LANGUAGE
EN
English
LENGTH
115
Pages
PUBLISHER
Progressive Management
SIZE
502.4
KB

More Books by Progressive Management

War in the Balkans, 1991-2002: Comprehensive History of Wars Provoked by Yugoslav Collapse: Balkan Region in World Politics, Slovenia and Croatia, Bosnia-Herzegovina, Kosovo, Greece, Turkey, Cyprus War in the Balkans, 1991-2002: Comprehensive History of Wars Provoked by Yugoslav Collapse: Balkan Region in World Politics, Slovenia and Croatia, Bosnia-Herzegovina, Kosovo, Greece, Turkey, Cyprus
2014
General George S. Patton: Operational Art, Battle Command Lessons in the Second World War, Leadership Development, Battle of the Bulge, Many Faces, Air Power for Patton's Army in World War II General George S. Patton: Operational Art, Battle Command Lessons in the Second World War, Leadership Development, Battle of the Bulge, Many Faces, Air Power for Patton's Army in World War II
2014
Weapon of Choice: ARSOF in Afghanistan (Army Special Operations Forces) - 9/11 Attacks, Toppling the Taliban, Osama bin Laden, Destroying al-Qaeda in the War on Terror, First Round of Afghan War Weapon of Choice: ARSOF in Afghanistan (Army Special Operations Forces) - 9/11 Attacks, Toppling the Taliban, Osama bin Laden, Destroying al-Qaeda in the War on Terror, First Round of Afghan War
2014
The Final Status of Kosovo and its Implications for Balkan Stability: Scenarios, Post-Conflict Society, Security, Governance, Well-being, Justice and Reconciliation The Final Status of Kosovo and its Implications for Balkan Stability: Scenarios, Post-Conflict Society, Security, Governance, Well-being, Justice and Reconciliation
2013
Global Trends 2030: Alternative Worlds - American Intelligence Agency Report on the Megatrends, Gamechangers, and Black Swans of the Future, the Rise of China, Alternative World Scenarios Global Trends 2030: Alternative Worlds - American Intelligence Agency Report on the Megatrends, Gamechangers, and Black Swans of the Future, the Rise of China, Alternative World Scenarios
2012
Global Trends 2025: A Transformed World - Globalizing Economy, Demographics of Discord, New Players, Scarcity in the Midst of Plenty, Potential for Conflict, Power-Sharing in a Multipolar World Global Trends 2025: A Transformed World - Globalizing Economy, Demographics of Discord, New Players, Scarcity in the Midst of Plenty, Potential for Conflict, Power-Sharing in a Multipolar World
2012