Find a copy online
Links to this item
Find a copy in the library
Finding libraries that hold this item...
|Additional Physical Format:||Print version:
Cyber Security : Deterrence and IT Protection for Critical Infrastructures.
Dordrecht : Springer, ©2013
|Material Type:||Document, Internet resource|
|Document Type:||Internet Resource, Computer File|
|All Authors / Contributors:||
|Description:||1 online resource (82 pages).|
|Contents:||Preface; About the IWG-LNCV; Cyber as Deterrent; Abstract; Executive Summary; Basics of Cybered Deterrence; Doctrines of Cybered Deterrence; Force Posture of Cybered Deterrence; Cybered Deterrence Dilemmas; A Comparison of Cybered Deterrence and Nuclear Deterrence; Potential Actors and the Right Narrative; Cybersecurity and Cyber Weapons: Is Nonproliferation Possible?; Abstract; Introduction; Critical Infrastructure Facilities are Now Targets; Invasive and Destructive Cyber Weapons Resemble Nuclear WMD; U.S. Acknowledges Development of Cyber Weapons; Characteristics of Cyber Weapons. Iran Creates its Own Cyber CommandReports Link Iran to Cyberattacks Against U.S. and Allies; New Cyber Arms Race; International Tensions Have Created New Market Forces; The Growing Problem for Internet Security; Concerns About Nonproliferation; Barriers to Nonproliferation of Cyber Weapons; Unique Characteristics of Cyber Weapons; The Growing Market for Malicious Code; Export Restrictions Under ITAR and Wassenaar; Questions to Consider for Cyber Nonproliferation; Conclusion; Bibliography; Cyber Security for Nuclear Power Plants; Abstract; Setting the Stage; Domains for Engagement. Nuclear Terrorism and the Proliferation of Nuclear WeaponsRecommended Actions for the Seoul Nuclear Security Summit; Definitions; Legal Authority; Protective Measures; Capability; Creation & Sharing of Relevant National & International Intelligence; Cyber Security Systems Implementation; Law Enforcement; Lessons Learned; Bibliography; Cyber Security for Chemical Plants; Abstract; Introduction; Identifying the Threat; Cyber Espionage; Sabotage; Countering Cyber-Attacks; Possible OPCW Involvement in Cyber Security for Chemical Plants; Summary and Conclusions; Bibliography. From Fortress to ResilienceAbstract; Bibliography; Cyber Security and Resilience of Industrial Control Systems and Critical Infrastructures; Abstract; Introduction; Industrial Control Systems; Vulnerabilities; Methods of Attack; Sector Analysis; History of Some Cases; Could a Resilient Infrastructure Mitigate the Risks of Cyberattacks?; International Approaches on Resilience; Bibliography.|
|Series Title:||SpringerBriefs in computer science.|