Cyberterrorism After Stuxnet

Author:   Thomas M Chen ,  Strategic Studies Institute (U S ) ,  Army War College (U S ) ,  Douglas C Lovelace
Publisher:   Department of the Army
ISBN:  

9781584876274


Pages:   40
Publication Date:   29 June 2015
Recommended Age:   From 19 to 10 years
Format:   Paperback
Availability:   In stock   Availability explained
We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately.

Our Price $18.48 Quantity:  
Add to Cart

Share |

Cyberterrorism After Stuxnet


Add your own review!

Overview

Terrorists are known to use the Internet for communications, planning, recruitment, propaganda, and reconnaissance. They have shown interest in carrying out cyberattacks on U.S. critical infrastructures, although no such serious attacks are known pub-licly to have occurred. The discovery of the Stuxnet malware in July 2010, and its analysis over the next several months, was widely believed to have been a landmark event in cybersecurity, because it showed that cyberattacks against industrial control systems, hypothesized for a long time, are actually possible. After Stuxnet, there were public concerns that terrorists might be encouraged to acquire capabilities for similar cyberattacks. This monograph examines cyberterrorism before and after Stuxnet by addressing questions of: 1. Motive--Are terrorists interested in launching cyberattacks against U.S. critical infrastructures? 2. Means--Are terrorists building capabilities and skills for cyberattacks? 3. Opportunity--How vulnerable are U.S. critical infrastructures? It is noted that no serious cyberterrorism attacks have occurred after Stuxnet. This can be explained from a cost-benefit perspective that has not changed since Stuxnet. It can be argued that U.S. policies can really address vulnerabilities only by strengthening defenses of critical infrastructures. Related products: Prospects for the Rule of Law in Cyberspace is available here: https: //bookstore.gpo.gov/products/sku/008-000-01222-9 Legality in Cyberspace: An Adversary View is available here: https: //bookstore.gpo.gov/products/sku/008-000-01108-7 Cyberspacce: Malevolent Actors, Criminal Opportunities, and Strategic Competition is available here: https: //bookstore.gpo.gov/products/sku/008-000-01210-5 The Rise of iWar: Identity, Information, and the Individualization of Modern Warfare can be found here: https: //bookstore.gpo.gov/products/sku/008-000-01198-2 NATO Cyberspace Capability: A Strategic and Operational Evolution can be found here: https: //bookstore.gpo.gov/products/sku/008-000-01191-5

Full Product Details

Author:   Thomas M Chen ,  Strategic Studies Institute (U S ) ,  Army War College (U S ) ,  Douglas C Lovelace
Publisher:   Department of the Army
Imprint:   Department of the Army
Dimensions:   Width: 15.20cm , Height: 0.60cm , Length: 22.90cm
Weight:   0.113kg
ISBN:  

9781584876274


ISBN 10:   1584876271
Pages:   40
Publication Date:   29 June 2015
Recommended Age:   From 19 to 10 years
Audience:   General/trade ,  General
Format:   Paperback
Publisher's Status:   Active
Availability:   In stock   Availability explained
We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately.

Table of Contents

Reviews

Related articles: E-INTERNATIONAL RELATIONS STUDENTS The Threat of Cyberterrorism to Critical Infrastructure by Sam Powers September 2, 2013 http: //www.e-ir.info/2013/09/02/the-threat-of-cyberterrorism-to-critical-infrastructure/Science Direct Orbis Volume 59, Issue 1, 2015, Pages 111-128 Cyber-Terrorism in a Post-Stuxnet World by Michael Kenney http: //www.sciencedirect.com/science/article/pii/S0030438714000787


Author Information

ABOUT THE AUTHOR THOMAS M. CHEN is a professor of cybersecurity in the School of Engineering and Mathematical Sciences at City University London, United Kingdom (UK). He was formerly a Professor in Networks in the College of Engineering at Swansea University, UK. Prior to joining Swansea University, he was an Associate Professor in electrical engineering at Southern Methodist University, Dallas, Texas, and a senior member of technical staff at GTE R&D Laboratories (now Verizon Labs), Waltham, Massachusetts. He has 22 years of research experience in academia and industry. Dr. Chen has published widely on issues related to Internet security. His work has been supported by government agencies, such as the National Science Foundation and Department of Homeland Security, and various companies including Nortel Networks, Alcatel, and Sprint. He regularly collaborates with researchers in major security companies. Recently he has been involved in an interdisciplinary research project in cyberterrorism with colleagues in Law and Political Science at Swansea University. Dr. Chen holds B.S. and M.S. degrees from Massachusetts Institute of Technology, and a Ph.D. in electrical engineering from University of California, Berkeley.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List