This specific ISBN edition is currently not available.View all copies of this ISBN edition:
Terrorists are known to use the Internet for communications, planning, recruitment, propaganda, and reconnaissance. They have shown interest in carrying out cyberattacks on U.S. critical infrastructures, although no such serious attacks are known publicly to have occurred. The discovery of the Stuxnet malware in July 2010, and its analysis over the next several months, was widely believed to have been a landmark event in cybersecurity, because it showed that cyberattacks against industrial control systems, hypothesized for a long time, are actually possible. After Stuxnet, there were public concerns that terrorists might be encouraged to acquire capabilities for similar cyberattacks.
This monograph examines cyberterrorism before and after Stuxnet by addressing questions of:
1. Motive—Are terrorists interested in launching cyberattacks against U.S. critical infrastructures?
2. Means—Are terrorists building capabilities and skills for cyberattacks?
3. Opportunity—How vulnerable are U.S. critical infrastructures?
It is noted that no serious cyberterrorism attacks have occurred after Stuxnet. This can be explained from a cost-benefit perspective that has not changed since Stuxnet. It can be argued that U.S. policies can really address vulnerabilities only by strengthening defenses of critical infrastructures.
Prospects for the Rule of Law in Cyberspace is available here: https://bookstore.gpo.gov/products/sku/008-000-01222-9
Legality in Cyberspace: An Adversary View is available here: https://bookstore.gpo.gov/products/sku/008-000-01108-7
Cyberspacce: Malevolent Actors, Criminal Opportunities, and Strategic Competition is available here: https://bookstore.gpo.gov/products/sku/008-000-01210-5
The Rise of iWar: Identity, Information, and the Individualization of Modern Warfare can be found here: https://bookstore.gpo.gov/products/sku/008-000-01198-2
NATO Cyberspace Capability: A Strategic and Operational Evolution can be found here: https://bookstore.gpo.gov/products/sku/008-000-01191-5
"synopsis" may belong to another edition of this title.
ABOUT THE AUTHOR
THOMAS M. CHEN is a professor of cybersecurity in the School of Engineering and Mathematical Sciences at City University London, United Kingdom (UK). He was formerly a Professor in Networks in the College of Engineering at Swansea University, UK. Prior to joining Swansea University, he was an Associate Professor in electrical engineering at Southern Methodist University, Dallas, Texas, and a senior member of technical staff at GTE R&D Laboratories (now Verizon Labs), Waltham, Massachusetts. He has 22 years of research experience in academia and industry. Dr. Chen has published widely on issues related to Internet security. His work has been supported by government agencies, such as the National Science Foundation and Department of Homeland Security, and various companies including Nortel Networks, Alcatel, and Sprint. He regularly collaborates with researchers in major security companies. Recently he has been involved in an interdisciplinary research project in cyberterrorism with colleagues in Law and Political Science at Swansea University. Dr. Chen holds B.S. and M.S. degrees from Massachusetts Institute of Technology, and a Ph.D. in electrical engineering from University of California, Berkeley.
E-INTERNATIONAL RELATIONS STUDENTS The Threat of Cyberterrorism to Critical Infrastructure by Sam Powers September 2, 2013 http://www.e-ir.info/2013/09/02/the-threat-of-cyberterrorism-to-critical-infrastructure/
Science Direct Orbis Volume 59, Issue 1, 2015, Pages 111-128 Cyber-Terrorism in a Post-Stuxnet World by Michael Kenney http://www.sciencedirect.com/science/article/pii/S0030438714000787
"About this title" may belong to another edition of this title.
(No Available Copies)
If you know the book but cannot find it on AbeBooks, we can automatically search for it on your behalf as new inventory is added. If it is added to AbeBooks by one of our member booksellers, we will notify you!Create a Want