Cyberterrorism after Stuxnet /

Saved in:
Bibliographic Details
Author / Creator:Chen, Thomas M., author.
Imprint:Carlisle Barracks, Pennsylvania : Strategic Studies Institute and U.S. Army War College Press, 2014.
Description:1 online resource (ix, 30 pages)
Language:English
Subject:
Format: E-Resource U.S. Federal Government Document Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/10031498
Hidden Bibliographic Details
Other authors / contributors:Army War College (U.S.). Strategic Studies Institute, publisher.
Army War College (U.S.). Press, publisher.
ISBN:1584876271
9781584876274
Digital file characteristics:text file PDF
Notes:"June 2014."
Includes bibliographical references (pages 26-30).
Description based on online resource; title from PDF title page (SSI, viewed June 13, 2014).
Summary:The discovery of STUXNET was a recent milestone in the arena of cyber security because it was the first malware designed to cause real world damage to industrial control systems. It demonstrated that a sufficiently determined adversary might be able to cause physical damage to U.S. critical infrastructure through a cyberattack. This monograph asks if STUXNET has had an effect on cyberterrorism in terms of motive, means, and opportunity. It is argued that terrorists have ample motive, opportunity, and modest means, which raises the question of why a major cyberattack has not happened yet. The lack of cyberattacks can be explained by a cost-benefit argument, and STUXNET has not changed the cost-benefit equation. Cyberattacks are unlikely in the near future, but the cost-benefit argument does not rule out the possibility of cyberattacks in the long term if costs change. There seems little that can be done to change terrorist motive or means. The only factor that is feasible to address is opportunity. Specifically, policies should enhance protection of national infrastructure to reduce the risk exposure to cyberattacks.
GPO item no.:0307-A-31 (online)
Govt.docs classification:D 101.146:C 99/3

Similar Items