Design And Implementation Of An Effective Intrusion Incident Response Mechanism For Critical Infrastructures That Is Inherently Vulnerable To Cyber Terrorist Attack
[Design and implementation of an effective intrusion incident response mechanism for critical infrastructures that is inherently vulnerable to cyber terrorist attack]
by
Acknowledgement
I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible.
DECLARATION
I, [type your full first names and surname here], declare that contents of this dissertation/thesis represent my own unaided work, and that dissertation/thesis has not previously been submitted for academic examination towards any qualification. Furthermore, it represents my own opinions and not necessarily those of University.
Signed __________________ Date _________________
Table of Contents
Contents
CHAPTER 1: INTRODUCTION5
Study Background5
The Problem5
Research Goals and Objectives6
Significance of Study6
Justification / Nature Study7
Hypothesis / Research Question7
CHAPTER 2: LITERATURE REVIEW9
The scale of terrorist threat13
Cyber terrorism20
National Institute of Standards and Technology25
Defense Department26
Federal Energy Regulatory Commission27
CHAPTER 3: METHODOLOGY39
Deign Research39
Qualitative Research39
Quantitative Research39
Sample40
Data Collection41
Estimation type42
Data Collection43
CHAPTER 4: DISCUSSION & FINDINGS44
CHAPTER 5: CONCLUSION51
REFERENCE59
Chapter 1: Introduction
Study Background Design and implementation of an aggressive consequence behave against method of intrusion of severe infrastructure that are inherently shelled towards involvement via cyber terrorists. Much of U.S. severe infrastructure is perhaps shelled towards cyber attack. Industrial revision computer approaches decided onto via within this infrastructure are specific points of vulnerability, as cyber-security for these approaches has not been supposed as the tall priority. Industry components perhaps adjusted via the cyber-attack onto procedure revision approaches herald electrical, phone, water, chemicals, and energy. The average social relations fractions average social relations fractions has distributed alarms draw lid bind swelled attention within terrorism within cyber defense of carried forward revision approaches, mentioning international terrorist bundle attention within severe infrastructure and strengthen within cyber assails onto severe approaches infrastructure. The credible excess distributes of the cyberattack within resistance towards severe infrastructure carried forward revision approaches bunch from temporary grant upper of service towards the catastrophic infrastructure failure adjusting multiple settles for an extension. The National Strategy towards Secure Cyberspace, released within February 2003, laid upper of a lot plans bill allegation for defense predictions for revision systems. A purpose onto integration of public-private partnerships and exchange of coaching is summarized, along with plans that predictions for protective revision approaches be concluded and implemented.
The Problem The National Security Act of 2002 (PL 107-296) borne and blended numerous settles that operate of sandy along riverside within cyber defense of revision approaches within Department of Homeland Security. These units herald Office of Critical Infrastructure Assurance, Centre for Protection of National Infrastructure National Infrastructure Simulation and Analysis Center and Department of Energy's Office of Energy Assurance. Also, Homeland Security Act of 2002 brought forward the fresh bundle of coaching, severe coaching infrastructure, which may be deteriorated from social via average social relations member's government.
Research Goals and Objectives Efforts within redeveloping cyber defense of revision approaches are underlined within average social relations fractions average social relations fractions facilities, and severe infrastructure components, across corporations groups. The Department of Energy national laboratories, Department of Defense and National Institute of Standards and Technology possess software towards compute arrivals and redevelop cyber-vulnerabilities of revision ...