It looks like you're offline.
Open Library logo
additional options menu

MARC Record from harvard_bibliographic_metadata

Record ID harvard_bibliographic_metadata/ab.bib.14.20150123.full.mrc:187879015:3022
Source harvard_bibliographic_metadata
Download Link /show-records/harvard_bibliographic_metadata/ab.bib.14.20150123.full.mrc:187879015:3022?format=raw

LEADER: 03022cam a2200445 i 4500
001 014138740-8
005 20140813121633.0
006 m o d f
008 140613s2014 pau ob f000 0 eng c
020 $z1584876271
020 $z9781584876274
035 0 $aocn881382053
040 $aAWC$beng$erda$epn$cAWC$dGPO
042 $apcc
050 4 $aHV6773.15.C97$bC44 2014
074 $a0307-A-31 (online)
086 0 $aD 101.146:C 99/3
100 1 $aChen, Thomas M.,$eauthor.
245 10 $aCyberterrorism after Stuxnet /$cThomas M. Chen.
264 1 $aCarlisle Barracks, PA :$bStrategic Studies Institute and U.S. Army War College Press,$c2014.
300 $a1 online resource (ix, 30 pages)
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
347 $atext file$bPDF$2rda
500 $a"June 2014."
504 $aIncludes bibliographical references (pages 26-30).
505 0 $aIntroduction -- Stuxnet. Methods of spreading -- Target -- Payload -- Significance and implication -- Terrorist motives and interest in cyber attacks. Terrorist uses of the internet -- Interest in cyberattacks -- Terrorist capabilities. Paying for proxies -- Vulnerabilities in U.S. critical infrastructures -- Why not a major cyberattack -- Conclusions and recommendations.
520 $aThe discovery of STUXNET was a recent milestone in the arena of cyber security because it was the first malware designed to cause real world damage to industrial control systems. It demonstrated that a sufficiently determined adversary might be able to cause physical damage to U.S. critical infrastructure through a cyberattack. This monograph asks if STUXNET has had an effect on cyberterrorism in terms of motive, means, and opportunity. It is argued that terrorists have ample motive, opportunity, and modest means, which raises the question of why a major cyberattack has not happened yet. The lack of cyberattacks can be explained by a cost-benefit argument, and STUXNET has not changed the cost-benefit equation. Cyberattacks are unlikely in the near future, but the cost-benefit argument does not rule out the possibility of cyberattacks in the long term if costs change. There seems little that can be done to change terrorist motive or means. The only factor that is feasible to address is opportunity. Specifically, policies should enhance protection of national infrastructure to reduce the risk exposure to cyberattacks.
588 $aDescription based on online resource; title from PDF title page (SSI, viewed June 13, 2014).
650 0 $aCyberterrorism.
650 0 $aMalware (Computer software)
650 0 $aComputer viruses.
650 0 $aCyberinfrastructure$xRisk assessment.
650 0 $aCyberinfrastructure$xSecurity measures.
710 2 $aArmy War College (U.S.).$bStrategic Studies Institute,$epublisher.
710 2 $aArmy War College (U.S.).$bPress,$epublisher.
988 $a20140813
049 $aKSGG
906 $0OCLC