Countering cyber sabotage: introducing consequence-driven, cyber-informed engineering (CCE)
"Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. C...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
CRC Press
2021
|
Ausgabe: | First edition |
Schlagworte: | |
Online-Zugang: | TUM01 TUM02 UER01 Volltext |
Zusammenfassung: | "Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense are lacking and struggle to capably stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or important CI companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and, thus, protect organizations in ways current approaches do not. The most pressing threat is cyber sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination of its 4 phases that follows. Chapters 4-7, each addressing one of the 4 phases, taking the reader on a more granular walkthrough of the methodology with examples from the field, and include the objectives of and steps to take in each of phases. The concluding chapter looks to the future to scale the capability and better protect critical infrastructure organizations"-- |
Beschreibung: | 1 Online-Ressource Illustrationen |
ISBN: | 9780367491161 |
DOI: | 10.4324/9780367491161 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV047246162 | ||
003 | DE-604 | ||
005 | 20210826 | ||
007 | cr|uuu---uuuuu | ||
008 | 210420s2021 |||| o||u| ||||||eng d | ||
020 | |a 9780367491161 |9 978-0-367-49116-1 | ||
024 | 7 | |a 10.4324/9780367491161 |2 doi | |
035 | |a (OCoLC)1249677179 | ||
035 | |a (DE-599)BVBBV047246162 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91G |a DE-29 | ||
084 | |a DAT 055 |2 stub | ||
084 | |a DAT 461 |2 stub | ||
100 | 1 | |a Bochman, Andrew A. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Countering cyber sabotage |b introducing consequence-driven, cyber-informed engineering (CCE) |c Andrew A. Bochman and Sarah Freeman |
250 | |a First edition | ||
264 | 1 | |a Boca Raton ; London ; New York |b CRC Press |c 2021 | |
300 | |a 1 Online-Ressource |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | 3 | |a "Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense are lacking and struggle to capably stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or important CI companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and, thus, protect organizations in ways current approaches do not. The most pressing threat is cyber sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination of its 4 phases that follows. Chapters 4-7, each addressing one of the 4 phases, taking the reader on a more granular walkthrough of the methodology with examples from the field, and include the objectives of and steps to take in each of phases. The concluding chapter looks to the future to scale the capability and better protect critical infrastructure organizations"-- | |
653 | 0 | |a Computer security / United States | |
653 | 0 | |a Computer crimes / United States / Prevention | |
653 | 0 | |a Automation / Security measures | |
653 | 0 | |a Infrastructure (Economics) / Protection / United States | |
653 | 0 | |a National security / United States | |
653 | 0 | |a Automation / Security measures | |
653 | 0 | |a Computer crimes / Prevention | |
653 | 0 | |a National security | |
653 | 2 | |a United States | |
700 | 1 | |a Freeman, Sarah |e Verfasser |4 aut | |
776 | 0 | 8 | |i Print version |n Druck-Ausgabe, Hardcover |z 978-0-367-49115-4 |a Bochman, Andrew A. |t Countering cyber sabotage |d Boca Raton, FL : CRC Press, 2021 |
856 | 4 | 0 | |u https://doi.org/10.4324/9780367491161 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-7-TFC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032650322 | ||
966 | e | |u https://doi.org/10.4324/9780367491161 |l TUM01 |p ZDB-7-TFC |q TUM_Einzelkauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4324/9780367491161 |l TUM02 |p ZDB-7-TFC |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4324/9780367491161 |l UER01 |p ZDB-7-TFC |q UER_Einzelkauf |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804182386711199744 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Bochman, Andrew A. Freeman, Sarah |
author_facet | Bochman, Andrew A. Freeman, Sarah |
author_role | aut aut |
author_sort | Bochman, Andrew A. |
author_variant | a a b aa aab s f sf |
building | Verbundindex |
bvnumber | BV047246162 |
classification_tum | DAT 055 DAT 461 |
collection | ZDB-7-TFC |
ctrlnum | (OCoLC)1249677179 (DE-599)BVBBV047246162 |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.4324/9780367491161 |
edition | First edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03851nmm a2200505 c 4500</leader><controlfield tag="001">BV047246162</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210826 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210420s2021 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780367491161</subfield><subfield code="9">978-0-367-49116-1</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4324/9780367491161</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1249677179</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047246162</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-29</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 055</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 461</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bochman, Andrew A.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Countering cyber sabotage</subfield><subfield code="b">introducing consequence-driven, cyber-informed engineering (CCE)</subfield><subfield code="c">Andrew A. Bochman and Sarah Freeman</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">CRC Press</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense are lacking and struggle to capably stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or important CI companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and, thus, protect organizations in ways current approaches do not. The most pressing threat is cyber sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination of its 4 phases that follows. Chapters 4-7, each addressing one of the 4 phases, taking the reader on a more granular walkthrough of the methodology with examples from the field, and include the objectives of and steps to take in each of phases. The concluding chapter looks to the future to scale the capability and better protect critical infrastructure organizations"--</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security / United States</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer crimes / United States / Prevention</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Automation / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Infrastructure (Economics) / Protection / United States</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">National security / United States</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Automation / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer crimes / Prevention</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">National security</subfield></datafield><datafield tag="653" ind1=" " ind2="2"><subfield code="a">United States</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Freeman, Sarah</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version</subfield><subfield code="n">Druck-Ausgabe, Hardcover</subfield><subfield code="z">978-0-367-49115-4</subfield><subfield code="a">Bochman, Andrew A.</subfield><subfield code="t">Countering cyber sabotage</subfield><subfield code="d">Boca Raton, FL : CRC Press, 2021</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4324/9780367491161</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-7-TFC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032650322</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4324/9780367491161</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-7-TFC</subfield><subfield code="q">TUM_Einzelkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4324/9780367491161</subfield><subfield code="l">TUM02</subfield><subfield code="p">ZDB-7-TFC</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4324/9780367491161</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-7-TFC</subfield><subfield code="q">UER_Einzelkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047246162 |
illustrated | Not Illustrated |
index_date | 2024-07-03T17:06:27Z |
indexdate | 2024-07-10T09:06:44Z |
institution | BVB |
isbn | 9780367491161 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032650322 |
oclc_num | 1249677179 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-29 |
owner_facet | DE-91G DE-BY-TUM DE-29 |
physical | 1 Online-Ressource Illustrationen |
psigel | ZDB-7-TFC ZDB-7-TFC TUM_Einzelkauf ZDB-7-TFC UER_Einzelkauf |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | CRC Press |
record_format | marc |
spelling | Bochman, Andrew A. Verfasser aut Countering cyber sabotage introducing consequence-driven, cyber-informed engineering (CCE) Andrew A. Bochman and Sarah Freeman First edition Boca Raton ; London ; New York CRC Press 2021 1 Online-Ressource Illustrationen txt rdacontent c rdamedia cr rdacarrier "Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes. Current best practice approaches to cyber defense are lacking and struggle to capably stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or important CI companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and, thus, protect organizations in ways current approaches do not. The most pressing threat is cyber sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable. Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination of its 4 phases that follows. Chapters 4-7, each addressing one of the 4 phases, taking the reader on a more granular walkthrough of the methodology with examples from the field, and include the objectives of and steps to take in each of phases. The concluding chapter looks to the future to scale the capability and better protect critical infrastructure organizations"-- Computer security / United States Computer crimes / United States / Prevention Automation / Security measures Infrastructure (Economics) / Protection / United States National security / United States Computer crimes / Prevention National security United States Freeman, Sarah Verfasser aut Print version Druck-Ausgabe, Hardcover 978-0-367-49115-4 Bochman, Andrew A. Countering cyber sabotage Boca Raton, FL : CRC Press, 2021 https://doi.org/10.4324/9780367491161 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Bochman, Andrew A. Freeman, Sarah Countering cyber sabotage introducing consequence-driven, cyber-informed engineering (CCE) |
title | Countering cyber sabotage introducing consequence-driven, cyber-informed engineering (CCE) |
title_auth | Countering cyber sabotage introducing consequence-driven, cyber-informed engineering (CCE) |
title_exact_search | Countering cyber sabotage introducing consequence-driven, cyber-informed engineering (CCE) |
title_exact_search_txtP | Countering cyber sabotage introducing consequence-driven, cyber-informed engineering (CCE) |
title_full | Countering cyber sabotage introducing consequence-driven, cyber-informed engineering (CCE) Andrew A. Bochman and Sarah Freeman |
title_fullStr | Countering cyber sabotage introducing consequence-driven, cyber-informed engineering (CCE) Andrew A. Bochman and Sarah Freeman |
title_full_unstemmed | Countering cyber sabotage introducing consequence-driven, cyber-informed engineering (CCE) Andrew A. Bochman and Sarah Freeman |
title_short | Countering cyber sabotage |
title_sort | countering cyber sabotage introducing consequence driven cyber informed engineering cce |
title_sub | introducing consequence-driven, cyber-informed engineering (CCE) |
url | https://doi.org/10.4324/9780367491161 |
work_keys_str_mv | AT bochmanandrewa counteringcybersabotageintroducingconsequencedrivencyberinformedengineeringcce AT freemansarah counteringcybersabotageintroducingconsequencedrivencyberinformedengineeringcce |