Techniques To Identify Emerging Cyber-Security Threats And Threats Agents On Industrial Control Systems

Read Complete Research Material



Techniques to Identify Emerging Cyber-Security Threats and Threats Agents on Industrial Control Systems

By

TABLE OF CONTENTS

CHAPTER 1: INTRODUCTION1

1.1 Introduction1

1.2 Background of Study1

1.2.1 Cyber Threat3

1.3 Problem Statement5

1.4 Significance of the Study6

1.5 Nature of Study6

1.6 Aims & Objectives of the Research7

1.7 Research Questions8

1.8 Conceptual or Theoretical Framework8

1.9 Definitions9

1.10 Assumptions11

1.11 Scope, limitations, and Delimitations11

1.12 Chapter Summary12

CHAPTER 2: LITERATURE REVIEW13

2.1 Introduction13

2.2 Historical Overview13

2.3 Key Treats to the Safety of Industrial Control Systems & Threat Agents14

2.4 Cyber Security16

2.5 Challenges to International Cyber security Efforts17

2.6 Cyber Attacks18

2.7 Role of NIST in U.S. National Security19

2.7.1 Chemical, Biological and Other Threats20

2.7.2 Protection of Infrastructure and Cyber Security21

2.7.3 Nuclear, Radiological, and Explosive Materials22

2.7.4 Responding To Emergency Situations22

2.8 Security Technologies for Manufacturing and Control Systems23

2.9 Chapter Summary24

CHAPTER 3: METHODOLOGY25

3.1 Introduction25

3.2 Research Design25

3.3 Research Techniques and Procedures26

3.4 Sampling26

3.5 Sampling Strategies26

3.6 Sample size27

3.7 Sampling method27

3.8 Literature Search27

3.9 Data Collection Method27

3.10 Data Analysis28

3.11 Rationale for a Qualitative Study28

3.12 Reliability/Dependability29

3.13 Validity30

3.14 Data Security: Participant Anonymity and Document Retention31

3.14 Time Horizon32

3.15 Ethical Considerations33

3.16 Keywords Used34

3.17 Organization and Clarity34

3.18 Chapter Summary34

REFERENCES36

CHAPTER 1: INTRODUCTION

1.1 Introduction

Cyber threats are currently significant enough to become a national security priority in several western countries including the United States. In order to better understand the challenges that the United States, cyber infrastructures are facing, it is necessary to understand the techniques which help in identifying emerging cyber security threats posed by those who perpetrate computer-based crimes and attacks. On one hand, computer crimes are often a modified or hi-tech version of more traditional crimes such as theft, espionage, sabotage, and fraud. On the other hand, the ramification of cyber crimes are so extensive and technologically complex that they require specific knowledge to better understand the evolving nature of the threats as well as the tactics and strategies to investigate them (Balkin, 2006).

This research has been organized in successive chapters and exposes the overall understanding of the topic on hand. It consists of five chapters. The first chapter provides an overview and background of the research and put emphasis on aims and objectives of the study, while the second chapter focuses on the prior research work which has been done by other researchers. Chapter three gives the detail of the methodology followed and chapter four will illustrates the analysis of the findings and present the research data gathered. Recommendations and conclusion will be provided in chapter five.

1.2 Background of Study

Internet, by far is the best innovation man has ever created. In the initial days, communication was made by verbal or non verbal cues, even if people stayed far away from each other. Later came letters, which could be sent to the near and dears. With the world progressing so rapidly, people became closer than they ever were before, and came along a great invention made by Graham Bell, the telephone. With telephone in the back of the mind, communication stream further widened to include Internet. Internet has become the best tool for communication. People communicate via email, chat, voice and video chat (the recent addition to the ever increasing resources provided by ...
Related Ads