Skip to main content

2022 | Buch

Cyberwarfare

Threats to Critical Infrastructure

insite
SUCHEN

Über dieses Buch

This book provides a detailed examination of the threats and dangers facing the West at the far end of the cybersecurity spectrum. It concentrates on threats to critical infrastructure which includes major public utilities. It focusses on the threats posed by the two most potent adversaries/competitors to the West, Russia and China, whilst considering threats posed by Iran and North Korea. The arguments and themes are empirically driven but are also driven by the need to evolve the nascent debate on cyberwarfare and conceptions of ‘cyberwar’. This book seeks to progress both conceptions and define them more tightly. This accessibly written book speaks to those interested in cybersecurity, international relations and international security, law, criminology, psychology as well as to the technical cybersecurity community, those in industry, governments, policing, law making and law enforcement, and in militaries (particularly NATO members).

Inhaltsverzeichnis

Frontmatter
Chapter 1. Introduction
Abstract
The introduction sets the scene for the book. It begins with what cyberwar and cyberwarfare against critical infrastructure/critical national infrastructure mean and entails and how this could well be life-threatening and produce a mass casualty event. It then goes on to discuss the threat actors; states as targets and attackers; cybercriminals and their usefulness as ‘proxies’ and ‘privateers’; and the threat landscape. It then goes on to discuss Machine Learning, Artificial Intelligence, and High Performance (Quantum) Computing; then critical infrastructure, and the idea of subduing an enemy without fighting with cyber as the fifth domain of war. It ends with a guide to the terminology used throughout and an overview of each chapter.
Kristan Stoddart
Chapter 2. On Cyberwar: Theorizing Cyberwarfare Through Attacks on Critical Infrastructure—Reality, Potential, and Debates
Kristan Stoddart
Chapter 3. Cyberwar: Attacking Critical Infrastructure
Abstract
This chapter opens by outlining Supervisory Control and Data Acquisition systems and the importance of Industrial Control Systems to critical infrastructure. It details two proof-of-concept cases, Aurora and Stuxnet, before systematically breaking down the potential for cyberwarfare on the following areas of CI: electricity generation and distribution; electricity producing sites include nuclear power stations; water treatment and sanitation; dams and reservoirs; the oil and gas industry: rigs, refineries, and pipelines; chemical plants; ports and logistics; merchant shipping; road and rail; and civil aviation. It concludes with some good news and some bad news.
Kristan Stoddart
Chapter 4. Gaining Access: Attack and Defense Methods and Legacy Systems
Abstract
This chapter is a more technical chapter. It outlines and analyzes a series of cyberattack measures and then discusses counters and defenses. The attacks include the use of zero-days, rootkits, and Remote Access Trojans and remote access more widely and common tactics, techniques, and procedures. The counters and defenses include Firewalls, Demilitarized Zones, Intrusion Detection Systems, and zero trust security models. It then moves onto an examination of legacy systems and patching before looking at the targeting of companies in the supply chains that make up critical infrastructure.
Kristan Stoddart
Chapter 5. Hacking the Human
Abstract
Hacking the human has three main parts. The first part analyzes social engineering methods and practices. The second part is the world of professional nation-state espionage and their intelligence agencies. The third analyzes insider threats, physical security, and mitigation methods bearing in mind the global skills gap in ICT with people widely recognized as the weakest link in the cyber security fence. In so doing it considers spear phishing and human intelligence, outsider and insider threats, the Confidentiality, Integrity, and Availability triad, Computer Emergency Response Teams, and industry and government-backed self-help groups.
Kristan Stoddart
Chapter 6. Non and Sub-State Actors: Cybercrime, Terrorism, and Hackers
Abstract
Chapter 6 opens with an overview of outsider threats. These range from ‘script kiddies’, to organized criminal gangs, ‘hacktivist’ groups, and ‘leaktivists’, with the apex predators state-run and intelligence-led Advanced Persistent Threats (APTs) hostile to other nation-states. It systematically examines outsider threats, insider threats, and target spotting; hackers, hacking groups, and Social Engineering; Social Network Analysis; terrorism; cybercrime and ‘Dark Net’ markets; organized crime and ransomware; the use of proxy actors by states; and the WannaCry and NotPetya cases.
Kristan Stoddart
Chapter 7. Conclusion
Abstract
The conclusion looks back and assesses the opening chapter, On Cyberwarfare, the potential that attacking critical infrastructure holds, the risks of pinprick attacks, and the ability to strike first. It then re-examines cybersecurity defenses and risk management and legacy systems before an overview of states as Advanced Persistent Threats before then looking towards the U.S. Intelligence Community and what a whole of nation response means. It ends with the metaphor of the chess term zugzwang. This is where a player has to make a move but this results in a serious, often decisive, disadvantage. It is a move compelled by the rules of the game but one which, knowing the result, a player does not want to make.
Kristan Stoddart
Backmatter
Metadaten
Titel
Cyberwarfare
verfasst von
Kristan Stoddart
Copyright-Jahr
2022
Electronic ISBN
978-3-030-97299-8
Print ISBN
978-3-030-97298-1
DOI
https://doi.org/10.1007/978-3-030-97299-8

Premium Partner