• Complain

Andrew A. Bochman - Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE)

Here you can read online Andrew A. Bochman - Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: CRC Press, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Andrew A. Bochman Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE)
  • Book:
    Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE)
  • Author:
  • Publisher:
    CRC Press
  • Genre:
  • Year:
    2021
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE): summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE)" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes.

Current best practice approaches to cyber defense struggle to stop targeted attackers from creating potentially catastrophic results. From a national security perspective, it is not just the damage to the military, the economy, or essential critical infrastructure companies that is a concern. It is the cumulative, downstream effects from potential regional blackouts, military mission kills, transportation stoppages, water delivery or treatment issues, and so on. CCE is a validation that engineering first principles can be applied to the most important cybersecurity challenges and in so doing, protect organizations in ways current approaches do not. The most pressing threat is cyber-enabled sabotage, and CCE begins with the assumption that well-resourced, adaptive adversaries are already in and have been for some time, undetected and perhaps undetectable.

Chapter 1 recaps the current and near-future states of digital technologies in critical infrastructure and the implications of our near-total dependence on them. Chapters 2 and 3 describe the origins of the methodology and set the stage for the more in-depth examination that follows. Chapter 4 describes how to prepare for an engagement, and chapters 5-8 address each of the four phases. The CCE phase chapters take the reader on a more granular walkthrough of the methodology with examples from the field, phase objectives, and the steps to take in each phase. Concluding chapter 9 covers training options and looks towards a future where these concepts are scaled more broadly.

Andrew A. Bochman: author's other books


Who wrote Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE)? Find out the surname, the name of the author of the book and a list of all author's works by series.

Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE)" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Countering Cyber Sabotage Countering Cyber Sabotage Introducing - photo 1
Countering Cyber Sabotage
Countering Cyber Sabotage
Introducing Consequence-Driven, Cyber-Informed Engineering (CCE)

Andrew A. Bochman and Sarah Freeman

First edition published 2021 by CRC Press 2 Park Square Milton Park Abingdon - photo 2

First edition published 2021

by CRC Press

2 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN

and by CRC Press

6000 Broken Sound Parkway NW, Suite 300,

Boca Raton, FL 33487-2742

2021 Andrew A. Bochman and Sarah Freeman

CRC Press is an imprint of Informa UK Limited

The right of Andrew A. Bochman and Sarah Freeman to be identified as authors of this work has been asserted by them in accordance with sections 77 and 78 of the Copyright, Designs and Patents Act 1988.

All rights reserved. No part of this book may be reprinted or reproduced or utilised in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publishers.

For permission to photocopy or use material electronically from this work, access

Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for identification and explanation without intent to infringe.

Library of Congress Cataloging-in-Publication Data

Names: Bochman, Andrew A., author. | Freeman, Sarah, author.

Title: Countering cyber sabotage: introducing consequence-driven, cyber-informed
engineering/Andrew A. Bochman and Sarah Freeman.

Description: Boca Raton, FL: CRC Press, 2021. |
Includes bibliographical references and index.

Identifiers: LCCN 2020032432 (print) | LCCN 2020032433 (ebook) |
ISBN 9780367491154 (hardback) | ISBN 9781003130826 (ebook)

Subjects: LCSH: Computer securityUnited States. |
Computer crimesUnited StatesPrevention. | AutomationSecurity measures. |
Infrastructure (Economics)United StatesProtection. |
National securityUnited States.

Classification: LCC QA76.9.A25 B596 2021 (print) |
LCC QA76.9.A25 (ebook) | DDC 005.8dc23

LC record available at https://lccn.loc.gov/2020032432

LC ebook record available at https://lccn.loc.gov/2020032433

ISBN: 978-0-367-49115-4 (hbk)

ISBN: 978-1-003-13082-6 (ebk)

Typeset in Palatino

by Newgen Publishing UK

Contents

It is time to recognize how traditional engineering practices have fully absorbed cyber technology across the full engineering lifecycle. We must do more to fully understand our most critical systems, how they were built, how they work, on what they depend, and how they can be mistakenly operated. With this knowledge we need to make next generation designs demonstrably more secure. For many engineers, and the managers who employ them, this will require a series of conceptual leaps as the behavior of software is completely unlike the laws of physics in which they have until recently placed their full trust.

The aerospace sector provides a few recent instructive examples. The 2018 and 2019 Boeing 737 Max crashes revealed, catastrophically, erroneous assumptions about how software would compensate for observed flaws in engineered design. Earlier, other assumptions encoded in an overreliance on software doomed an AirBus A400M, prompting me to write this at the time:

This tragic accident reminds us of the nature of cyber and its ability to achieve scales that often surprise us. The safety basis for the aircraft failed to analyze a scenario involving software problems for more than one engine. There are numerous process safety efforts that also failed to account for software errors or malware conditions in many places at once (horizontal susceptibility) throughout the worlds power systems, chemical plants, and transportation systems.

Safety use case assumptions coded in software that are effective in individual systems can quickly break down when software links multiple systems. These risks exist separately from what can go wrong when an adversary enters the picture.

Although we are already well down the road to total dependency on digital systems, there remains much to be discovered about how engineers have come to trust software to fill gaps in first principles engineering. We must achieve and promulgate a much deeper understanding of the cyber contents of critical physical systems and the potential conflicts within them, including the processes used to create, operate, and maintain them.

This isnt just a recommendation; theres a warning here related to what is occurring in infrastructures around the world. Nation-states are leveraging substantial technical capabilities to put and hold critical infrastructure at risk, with ever-increasing cyberattacks against target (or victim) countries. While thats happening at the state-on-state level, companies are also being caught in the crossfire. Where infrastructure providers (e.g., energy, water, communications) used to focus emergency planning on assaults from Mother Nature, theyve now become pawns in a geopolitical chess match. Its been demonstrated that strikes on them can and will be used as shots across the bow, to deter military mobilization, to punch back, or to send whatever message one country feels like it needs to communicate to another, with all others watching.

Thats where we find ourselves. Its not Tom Clancy, its not marketing, and its not hyperbole. If you take what weve seen and heard as intentions, this is an iterative, unending, defensive call-to-arms. You must strive to understand your most vital systems more deeply than you ever have. This is one of the main tenets of consequence-driven, cyber-informed engineering (CCE), as is the need to identify potential paths of entry and closely monitor potential adversary activities in your supply chain and subcontractors, as well as network paths of entry, egress, and maneuver. This level of understanding is needed to achieve the earliest of warnings and tripwires, so you can move in ways that minimize consequences, work through attacks, recover fully, and get ready to do it again.

Cyberattacks like these have been going on beneath the surface for years, but cyber was used with more restraint as an instrument of projected international power and intimidation. Today the genie is out of the bottle and theres no going back. In this new world, critical infrastructure providers find themselves among the most attractive targets, not because of who they are but because of the essential services they provide and to whom they provide them.

Something I want to be sure to get across is that by understanding your most essential processes and systems deeply enough, you have a very good chance of minimizing the worst consequences during an event. Not only that, but you may be able to stall longer campaigns aimed at you. Those who lack the requisite level of understanding hand adversaries repeated opportunities to access and re-access their networks and systems.

What was the origin of CCE? For me, in the wake of the 9/11 attacks, it was when a series of government-sponsored experiments exposed the fact that very creative cyberattacks against complex infrastructure systems could be surprisingly effective and highly destructive. In ways reminiscent of General Billy Mitchells post World War I demonstration which showed, in the face of nearly universal skepticism, that aircraft could sink large-surface combatants, we quickly came to understand that as a nation, we were living with a huge, unacknowledged Achilles Heel.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE)»

Look at similar books to Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE). We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE)»

Discussion, reviews of the book Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.