Cyberterrorism after Stuxnet /
Saved in:
Author / Creator: | Chen, Thomas M., author. |
---|---|
Imprint: | Carlisle Barracks, Pennsylvania : Strategic Studies Institute and U.S. Army War College Press, 2014. |
Description: | 1 online resource (ix, 30 pages) |
Language: | English |
Subject: | |
Format: | E-Resource U.S. Federal Government Document Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/10031498 |
Other authors / contributors: | Army War College (U.S.). Strategic Studies Institute, publisher. Army War College (U.S.). Press, publisher. |
---|---|
ISBN: | 1584876271 9781584876274 |
Digital file characteristics: | text file PDF |
Notes: | "June 2014." Includes bibliographical references (pages 26-30). Description based on online resource; title from PDF title page (SSI, viewed June 13, 2014). |
Summary: | The discovery of STUXNET was a recent milestone in the arena of cyber security because it was the first malware designed to cause real world damage to industrial control systems. It demonstrated that a sufficiently determined adversary might be able to cause physical damage to U.S. critical infrastructure through a cyberattack. This monograph asks if STUXNET has had an effect on cyberterrorism in terms of motive, means, and opportunity. It is argued that terrorists have ample motive, opportunity, and modest means, which raises the question of why a major cyberattack has not happened yet. The lack of cyberattacks can be explained by a cost-benefit argument, and STUXNET has not changed the cost-benefit equation. Cyberattacks are unlikely in the near future, but the cost-benefit argument does not rule out the possibility of cyberattacks in the long term if costs change. There seems little that can be done to change terrorist motive or means. The only factor that is feasible to address is opportunity. Specifically, policies should enhance protection of national infrastructure to reduce the risk exposure to cyberattacks. |
GPO item no.: | 0307-A-31 (online) |
Govt.docs classification: | D 101.146:C 99/3 |
Similar Items
-
The global cyber-vulnerability report /
Published: (2015) -
Cybersecurity threats, malware trends, and strategies : discover risk mitigation strategies for modern threats to your organization /
by: Rains, Tim
Published: (2023) -
Cuckoo Malware Analysis.
by: Oktavianto, Digit
Published: (2013) -
Computer viruses and malware /
by: Aycock, John Daniel, 1970-
Published: (2006) -
Cybersecurity, botnets, and cyberterrorism /
by: Jacobson, George V.
Published: (2009)