ABSTRACT

Protection (Executive Order 13010)—President Clinton 34 2.1.2 Presidential Decision Directive-63-President Clinton 35 2.1.3 Office of Homeland Security (EO 13228)—President

George W. Bush 35 2.1.4 USA Patriot Act (Public Law 107-56)—U.S. Congress 36 2.1.5 Homeland Security Presidential Directive-7-

President George W. Bush 37 2.1.6 Presidential Policy Directive-21-President Obama 38

2.2 Critical Infrastructure Interdependencies 40 2.3 Optimization Models Application to Critical Infrastructures 41 2.4 Internet, Social Media, and Cyber Attacks on Critical

Infrastructures 42 2.4.1 Challenge of Protecting Our Nation 44 2.4.2 Three Critical Infrastructures 46

2.4.2.1 Energy and the Electrical Grid System 46 2.4.2.2 Transportation 49 2.4.2.3 Telecommunications 51

2.4.3 R&D in Support of Our Nation’s Critical Infrastructures 53 2.5 Cyber Threat Spectrum-Cyberspace Attacks and Weapons 54

2.5.1 Cyber Threat Capability and Cyber Tools 56 2.5.2 Cyber Digital Arsenal 57 2.5.3 Rationale of Cyberspace Infrastructure Attacks 57

2.6 Framework for Improving Critical Infrastructure Cybersecurity 58 Notes and References 63 Bibliography 64

Our nation’s 16 critical infrastructures have made us a world power, yet as much wealth and power as we have derived from these infrastructures, we must also recognize our vulnerabilities should they become the target of an attack. Clearly, not every one of our 16 infrastructures is vulnerable to a cyber attack; however, those critical infrastructures that are vulnerable to a cyber attack contain some of our nation’s most critical assets and resources. The phenomenal advances made in digital electronics are creating opportunities for both scientific advancements as well as dysfunctional consequences, as a result of dual-use capabilities. On one hand, these advances in our digital electronics can enhance productivity, introduce new scientific inventions, and improve the quality of life. On the other hand, these same advancements and discoveries in digital electronics could be weaponized and used to target individuals, infrastructures, and nations.