Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare

Thomas A. Johnson

April 16, 2015 by CRC Press
Textbook - 363 Pages - 2 B/W Illustrations
ISBN 9781482239225 - CAT# K23263

was $66.95

USD$53.56

SAVE ~$13.39

Add to Wish List
SAVE 25%
When you buy 2 or more print books!
See final price in shopping cart.
FREE Standard Shipping!

Features

    • Examines the threat spectrum of cyberspace attacks and cyber weapons
    • Defines the arsenal of cyber tools and new sophisticated attacks
    • Discusses the need for an architecture of cloud computing for cyber and counter intelligence
    • Emphasizes the Department of Defense’s role and the expansion of new mission forces to battle in cyberspace
    • Covers the US and international legal aspects of cybersecurity
    • Describes the difficulty of calculating the costs of defending against cyber attacks

      Summary

      The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporations to protect against these threats.

      The book first provides a historical reference, detailing the emergence of viruses, worms, malware, and other cyber threats that created the need for the cybersecurity field. It then discusses the vulnerabilities of our critical infrastructures, the broad arsenal of cyber attack tools, and the various engineering design issues involved in protecting our infrastructures. It goes on to cover cyber intelligence tactics, recent examples of cyber conflict and warfare, and the key issues in formulating a national strategy to defend against cyber warfare.

      The book also discusses how to assess and measure the cost of cybersecurity. It examines the many associated cost factors and presents the results of several important industry-based economic studies of security breaches that have occurred within many nations. The book concludes with a look at future trends in cybersecurity. It discusses the potential impact of industry-wide transformational changes, such as virtualization, social media, cloud computing, structured and unstructured data, big data, and data analytics.