000 03399cam a22004218i 4500
001 21628014
003 OSt
005 20230629061859.0
008 200727s2021 flu b 001 0 eng
010 _a 2020032432
020 _a9780367673710
040 _beng
_cNIRUC
_dNIRUC
042 _apcc
043 _an-us---
050 0 0 _aQA76.9.A25
_b. B63 2021
082 0 0 _a005.8
_223
100 1 _aBochman, Andrew A.,
_eauthor.
245 1 0 _aCountering cyber sabotage :
_bintroducing consequence-driven, cyber-informed engineering (CCE) /
_cAndrew A. Bochman and Sarah G. Freeman.
260 _aMilton Park, Abingdon, Oxon :
_bCRC Press,
_c2021.
263 _a2101
264 1 _aBoca Raton, FL :
_bCRC Press,
_c2021.
300 _axxxvii, 276p, ;
_bill,
_c24cm.
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
504 _aIncludes bibliographical references and index.
520 _a"Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense are lacking and struggle to capably stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or important CI companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and, thus, protect organizations in ways current approaches do not. The most pressing threat is cyber sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination of its 4 phases that follows. Chapters 4-7, each addressing one of the 4 phases, taking the reader on a more granular walkthrough of the methodology with examples from the field, and include the objectives of and steps to take in each of phases. The concluding chapter looks to the future to scale the capability and better protect critical infrastructure organizations"--
_cProvided by publisher.
650 0 _aComputer security
_xUnited States.
650 0 _aComputer crimes
_zUnited States
_xPrevention.
650 0 _aAutomation
_xSecurity measures.
650 0 _aInfrastructure (Economics)
_zUnited States
_xProtection.
650 0 _aNational security
_zUnited States.
700 1 _aFreeman, Sarah G.,
_eauthor.
776 0 8 _iOnline version:
_aBochman, Andrew A.,
_tCountering cyber sabotage
_dBoca Raton, FL : CRC Press, 2021.
_z9781003130826
_w(DLC) 2020032433
906 _a7
_bcbc
_corignew
_d1
_eecip
_f20
_gy-gencatlg
942 _2lcc
_cBK
_n0
999 _c304
_d304