| 000 | 03399cam a22004218i 4500 | ||
|---|---|---|---|
| 001 | 21628014 | ||
| 003 | OSt | ||
| 005 | 20230629061859.0 | ||
| 008 | 200727s2021 flu b 001 0 eng | ||
| 010 | _a 2020032432 | ||
| 020 | _a9780367673710 | ||
| 040 |
_beng _cNIRUC _dNIRUC |
||
| 042 | _apcc | ||
| 043 | _an-us--- | ||
| 050 | 0 | 0 |
_aQA76.9.A25 _b. B63 2021 |
| 082 | 0 | 0 |
_a005.8 _223 |
| 100 | 1 |
_aBochman, Andrew A., _eauthor. |
|
| 245 | 1 | 0 |
_aCountering cyber sabotage : _bintroducing consequence-driven, cyber-informed engineering (CCE) / _cAndrew A. Bochman and Sarah G. Freeman. |
| 260 |
_aMilton Park, Abingdon, Oxon : _bCRC Press, _c2021. |
||
| 263 | _a2101 | ||
| 264 | 1 |
_aBoca Raton, FL : _bCRC Press, _c2021. |
|
| 300 |
_axxxvii, 276p, ; _bill, _c24cm. |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_aunmediated _bn _2rdamedia |
||
| 338 |
_avolume _bnc _2rdacarrier |
||
| 504 | _aIncludes bibliographical references and index. | ||
| 520 |
_a"Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense are lacking and struggle to capably stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or important CI companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and, thus, protect organizations in ways current approaches do not. The most pressing threat is cyber sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination of its 4 phases that follows. Chapters 4-7, each addressing one of the 4 phases, taking the reader on a more granular walkthrough of the methodology with examples from the field, and include the objectives of and steps to take in each of phases. The concluding chapter looks to the future to scale the capability and better protect critical infrastructure organizations"-- _cProvided by publisher. |
||
| 650 | 0 |
_aComputer security _xUnited States. |
|
| 650 | 0 |
_aComputer crimes _zUnited States _xPrevention. |
|
| 650 | 0 |
_aAutomation _xSecurity measures. |
|
| 650 | 0 |
_aInfrastructure (Economics) _zUnited States _xProtection. |
|
| 650 | 0 |
_aNational security _zUnited States. |
|
| 700 | 1 |
_aFreeman, Sarah G., _eauthor. |
|
| 776 | 0 | 8 |
_iOnline version: _aBochman, Andrew A., _tCountering cyber sabotage _dBoca Raton, FL : CRC Press, 2021. _z9781003130826 _w(DLC) 2020032433 |
| 906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
| 942 |
_2lcc _cBK _n0 |
||
| 999 |
_c304 _d304 |
||