Cyberterrorism cyber prevention vs cyber recovery

Download
Author
DiBiasi, Jeffrey R.
Date
2007-12Advisor
Lawson, Letitia
Second Reader
Moran, Daniel
Metadata
Show full item recordAbstract
The technological age has forced the U.S. to engage a new set of national security challenges. Several potential adversaries have cyberspace capabilities comparable to those of the U.S., and are constantly conducting surveillance, gathering technical information, and mapping critical nodes that could be exploited in future conflicts. How can the U.S. government best defend against future cyber attacks? Recent policy documents set out a strategy for securing all of cyberspace, which experts argue is impossible to implement, but also unnecessary. This thesis seeks to move the discussion beyond this stalemate by undertaking an analysis of the vulnerability of cyberspace to terrorist attacks. The first analysis examines the Code Red Worm and the Slammer Worm. These two worms were selected because they were highly destructive and spread faster than normal worms, making them well suited for assessing the existing security of computers and networks. The next analysis examines a staged cyber attack on critical infrastructure, entitled Attack Aurora. In the staged Aurora attack, researchers from the Department of Energy's Idaho lab hacked into a replica of a power plant's control system. This attack is the most recent staged attack and facilitates an analysis of vulnerabilities of critical infrastructures to cyberterrorism.
Collections
Related items
Showing items related by title, author, creator and subject.
-
Key terrain: application to the layers of cyberspace
Pantin, Nicholas T. (Monterey, California: Naval Postgraduate School, 2017-03);The concept of key terrain is a common fixture in military strategy and tactics. The emergence of cyberspace, with characteristics unseen in any warfighting domain, challenge the concept's value. This work is a conceptual ... -
A legal reasoning component of a network security command and control system
Sousa, Gonçalo; Dementis, Georgios (Monterey, California. Naval Postgraduate School, 2010-03);There are numerous computer-aided tools to enable Computer Network Defense. However, their effectiveness in countering attacks is less than optimal when they are used independently of one another. Research has identified ... -
Cybersecurity policy and practice (MASL #P170370)
National Security Affairs (NSA) (Monterey, California, Naval Postgraduate School, 2015-08);The Center for Civil-Military Relations (CCMR) offers a one-week resident course in Monterey, California entitled "Cybersecurity Policy and Practice” for nations that are interested in developing capabilities to defend cyberspace ...