Countering cyber sabotage : introducing consequence-driven, cyber-informed engineering (CCE) /
Bochman, Andrew A.,
Countering cyber sabotage : introducing consequence-driven, cyber-informed engineering (CCE) / Andrew A. Bochman and Sarah G. Freeman. - Milton Park, Abingdon, Oxon : CRC Press, 2021. - xxxvii, 276p, ; ill, 24cm.
Includes bibliographical references and index.
"Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense are lacking and struggle to capably stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or important CI companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and, thus, protect organizations in ways current approaches do not. The most pressing threat is cyber sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination of its 4 phases that follows. Chapters 4-7, each addressing one of the 4 phases, taking the reader on a more granular walkthrough of the methodology with examples from the field, and include the objectives of and steps to take in each of phases. The concluding chapter looks to the future to scale the capability and better protect critical infrastructure organizations"--
9780367673710
2020032432
Computer security--United States.
Computer crimes--Prevention.--United States
Automation--Security measures.
Infrastructure (Economics)--Protection.--United States
National security--United States.
QA76.9.A25 / . B63 2021
005.8
Countering cyber sabotage : introducing consequence-driven, cyber-informed engineering (CCE) / Andrew A. Bochman and Sarah G. Freeman. - Milton Park, Abingdon, Oxon : CRC Press, 2021. - xxxvii, 276p, ; ill, 24cm.
Includes bibliographical references and index.
"Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense are lacking and struggle to capably stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or important CI companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and, thus, protect organizations in ways current approaches do not. The most pressing threat is cyber sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination of its 4 phases that follows. Chapters 4-7, each addressing one of the 4 phases, taking the reader on a more granular walkthrough of the methodology with examples from the field, and include the objectives of and steps to take in each of phases. The concluding chapter looks to the future to scale the capability and better protect critical infrastructure organizations"--
9780367673710
2020032432
Computer security--United States.
Computer crimes--Prevention.--United States
Automation--Security measures.
Infrastructure (Economics)--Protection.--United States
National security--United States.
QA76.9.A25 / . B63 2021
005.8
