Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
Record 28 of 132
Previous Record Next Record
E-Book/E-Doc
Author Chen, Thomas M., author.

Title Cyberterrorism after Stuxnet / Thomas M. Chen.

Publication Info. Carlisle Barracks, PA : Strategic Studies Institute and U.S. Army War College Press, 2014.

Copies

Location Call No. OPAC Message Status
 Axe Federal Documents Online  D 101.146:C 99/3    ---  Available
Description 1 online resource (ix, 30 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
Note "June 2014."
Bibliography Includes bibliographical references (pages 26-30).
Contents Introduction -- Stuxnet. Methods of spreading -- Target -- Payload -- Significance and implication -- Terrorist motives and interest in cyber attacks. Terrorist uses of the internet -- Interest in cyberattacks -- Terrorist capabilities. Paying for proxies -- Vulnerabilities in U.S. critical infrastructures -- Why not a major cyberattack -- Conclusions and recommendations.
Summary The discovery of STUXNET was a recent milestone in the arena of cyber security because it was the first malware designed to cause real world damage to industrial control systems. It demonstrated that a sufficiently determined adversary might be able to cause physical damage to U.S. critical infrastructure through a cyberattack. This monograph asks if STUXNET has had an effect on cyberterrorism in terms of motive, means, and opportunity. It is argued that terrorists have ample motive, opportunity, and modest means, which raises the question of why a major cyberattack has not happened yet. The lack of cyberattacks can be explained by a cost-benefit argument, and STUXNET has not changed the cost-benefit equation. Cyberattacks are unlikely in the near future, but the cost-benefit argument does not rule out the possibility of cyberattacks in the long term if costs change. There seems little that can be done to change terrorist motive or means. The only factor that is feasible to address is opportunity. Specifically, policies should enhance protection of national infrastructure to reduce the risk exposure to cyberattacks.
Note Description based on online resource; title from PDF title page (SSI, viewed June 13, 2014).
Subject Cyberterrorism.
Malware (Computer software)
Computer viruses.
Cyberinfrastructure -- Risk assessment.
Cyberinfrastructure -- Security measures.
Added Author Army War College (U.S.). Strategic Studies Institute, publisher.
Army War College (U.S.). Press, publisher.
ISBN 1584876271
9781584876274
Standard No. NLGGC 376434325
Gpo Item No. 0307-A-31 (online)
Sudoc No. D 101.146:C 99/3

 
    
Available items only