Countering cyber sabotage: introducing consequence-driven, cyber-informed engineering (CCE)

"Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. C...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Bochman, Andrew A. (VerfasserIn), Freeman, Sarah (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Boca Raton ; London ; New York CRC Press 2021
Ausgabe:First edition
Schlagworte:
Online-Zugang:TUM01
TUM02
UER01
Volltext
Zusammenfassung:"Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense are lacking and struggle to capably stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or important CI companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and, thus, protect organizations in ways current approaches do not. The most pressing threat is cyber sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination of its 4 phases that follows. Chapters 4-7, each addressing one of the 4 phases, taking the reader on a more granular walkthrough of the methodology with examples from the field, and include the objectives of and steps to take in each of phases. The concluding chapter looks to the future to scale the capability and better protect critical infrastructure organizations"--
Beschreibung:1 Online-Ressource Illustrationen
ISBN:9780367491161
DOI:10.4324/9780367491161

Es ist kein Print-Exemplar vorhanden.

Fernleihe Bestellen Achtung: Nicht im THWS-Bestand! Volltext öffnen