Design And Implementation Of An Effective Intrusion Incident Response Mechanism For Critical Infrastructures That Is Inherently Vulnerable To Cyber Terrorist Attack

Read Complete Research Material



[Design and implementation of an effective intrusion incident response mechanism for critical infrastructures that is inherently vulnerable to cyber terrorist attack]

by

Acknowledgement

I would take this opportunity to thank my research supervisor, family and friends for their support and guidance without which this research would not have been possible.

DECLARATION

I, [type your full first names and surname here], declare that contents of this dissertation/thesis represent my own unaided work, and that dissertation/thesis has not previously been submitted for academic examination towards any qualification. Furthermore, it represents my own opinions and not necessarily those of University.

Signed __________________ Date _________________

Table of Contents

Contents

CHAPTER 1: INTRODUCTION5

Study Background5

The Problem5

Research Goals and Objectives6

Significance of Study6

Justification / Nature Study7

Hypothesis / Research Question7

CHAPTER 2: LITERATURE REVIEW9

The scale of terrorist threat13

Cyber terrorism20

National Institute of Standards and Technology25

Defense Department26

Federal Energy Regulatory Commission27

CHAPTER 3: METHODOLOGY39

Deign Research39

Qualitative Research39

Quantitative Research39

Sample40

Data Collection41

Estimation type42

Data Collection43

CHAPTER 4: DISCUSSION & FINDINGS44

CHAPTER 5: CONCLUSION51

REFERENCE59

Chapter 1: Introduction

Study Background Design and implementation of an aggressive consequence behave against method of intrusion of severe infrastructure that are inherently shelled towards involvement via cyber terrorists. Much of U.S. severe infrastructure is perhaps shelled towards cyber attack. Industrial revision computer approaches decided onto via within this infrastructure are specific points of vulnerability, as cyber-security for these approaches has not been supposed as the tall priority. Industry components perhaps adjusted via the cyber-attack onto procedure revision approaches herald electrical, phone, water, chemicals, and energy. The average social relations fractions average social relations fractions has distributed alarms draw lid bind swelled attention within terrorism within cyber defense of carried forward revision approaches, mentioning international terrorist bundle attention within severe infrastructure and strengthen within cyber assails onto severe approaches infrastructure. The credible excess distributes of the cyberattack within resistance towards severe infrastructure carried forward revision approaches bunch from temporary grant upper of service towards the catastrophic infrastructure failure adjusting multiple settles for an extension. The National Strategy towards Secure Cyberspace, released within February 2003, laid upper of a lot plans bill allegation for defense predictions for revision systems. A purpose onto integration of public-private partnerships and exchange of coaching is summarized, along with plans that predictions for protective revision approaches be concluded and implemented.

The Problem The National Security Act of 2002 (PL 107-296) borne and blended numerous settles that operate of sandy along riverside within cyber defense of revision approaches within Department of Homeland Security. These units herald Office of Critical Infrastructure Assurance, Centre for Protection of National Infrastructure National Infrastructure Simulation and Analysis Center and Department of Energy's Office of Energy Assurance. Also, Homeland Security Act of 2002 brought forward the fresh bundle of coaching, severe coaching infrastructure, which may be deteriorated from social via average social relations member's government.

Research Goals and Objectives Efforts within redeveloping cyber defense of revision approaches are underlined within average social relations fractions average social relations fractions facilities, and severe infrastructure components, across corporations groups. The Department of Energy national laboratories, Department of Defense and National Institute of Standards and Technology possess software towards compute arrivals and redevelop cyber-vulnerabilities of revision ...
Related Ads