Defining, Evaluating, Preparing for and Responding to a Cyber Pearl Harbor

Abstract Despite not having a clear meaning, public perception and awareness makes the term cyber Pearl Harbor an important part of the public discourse. This paper considers what the term has meant and proposes its decomposition based on three different aspects of the historical Pearl Harbor attack, allowing the lessons from Pearl Harbor to be applied to threats and subjects that may not align with all aspects of the 1941 attack. Using these three definitions, prior attacks and current threats are assessed and preparation for and response to cyber Pearl Harbor events is discussed.

[1]  Muhammad Salman Khan,et al.  A Cognitive and Concurrent Cyber Kill Chain Model , 2018, Computer and Network Security Essentials.

[2]  InduShobha N. Chengalur-Smith,et al.  An overview of social engineering malware: Trends, tactics, and implications , 2010 .

[3]  Norman F. Schneidewind Metrics for mitigating cybersecurity threats to networks , 2010, IEEE Internet Computing.

[4]  Dawn M. Cappelli,et al.  Combating the Insider Cyber Threat , 2008, IEEE Security & Privacy.

[5]  Sean W. Smith,et al.  Never Mind Pearl Harbor--What about a Cyber Love Canal? , 2015, IEEE Security & Privacy.

[6]  Dimitrios Buhalis Information Technology for Small and Medium-Sized Tourism Enterprises: Adaptation and Benefits , 1999, J. Inf. Technol. Tour..

[7]  D. Byman Al-Qaeda as an Adversary: Do We Understand Our Enemy? , 2003 .

[8]  T. Holt,et al.  An Assessment of the Current State of Cybercrime Scholarship , 2014 .

[9]  Kevin Macnish,et al.  Ethics in cybersecurity research and practice , 2020, Technology in Society.

[10]  Thomas A. Hemphill,et al.  Financial data breaches in the U.S. retail economy: Restoring confidence in information technology security standards , 2016 .

[11]  Ronald Prescott Loui,et al.  How to Survive a Cyber Pearl Harbor , 2016, Computer.

[12]  M. C. Hudson To Play the Hegemon: Fifty Years of US Policy toward the Middle East , 1996 .

[13]  Sean Lawson,et al.  Cyber Pearl Harbor: Analogy, fear, and the framing of cyber security threats in the United States, 1991-2016 , 2019, First Monday.

[14]  T Saric,et al.  Improving Performance in Diabetes Care: Benefits of Information Technology Enabled Diabetes Management. , 2014, Value in health : the journal of the International Society for Pharmacoeconomics and Outcomes Research.

[15]  Patricia A. H. Williams,et al.  Cybersecurity vulnerabilities in medical devices: a complex environment and multifaceted problem , 2015, Medical devices.

[16]  David Kahn Pearl Harbor and the Inadequacy of Cryptanalysis , 1991, Cryptologia.

[17]  Sakir Sezer,et al.  STRIDE-based threat modeling for cyber-physical systems , 2017, 2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe).

[18]  William J. Chopik,et al.  The Benefits of Social Technology Use Among Older Adults Are Mediated by Reduced Loneliness , 2016, Cyberpsychology Behav. Soc. Netw..

[19]  R. Jervis Mutual Assured Destruction , 2002 .

[20]  The Cyber Pearl Harbor , 2017 .

[21]  Timothy R. Hill,et al.  Risk knowledge and concern as influences of purchase intention for internet of things devices , 2020 .

[22]  Lillian Ablon,et al.  Consumer Attitudes Toward Data Breach Notifications and Loss of Personal Information , 2016 .

[23]  Janice Light,et al.  The iPad and Mobile Technology Revolution: Benefits and Challenges for Individuals who require Augmentative and Alternative Communication , 2013, Augmentative and alternative communication.

[24]  T. Nam,et al.  Understanding the gap between perceived threats to and preparedness for cybersecurity , 2019, Technology in Society.

[25]  Lillian Ablon,et al.  Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits , 2017 .

[26]  Michael E. Lesk,et al.  Privacy and Cybersecurity: The Next 100 Years , 2012, Proceedings of the IEEE.

[27]  Jonghwa Park,et al.  The role of privacy fatigue in online privacy behavior , 2018, Comput. Hum. Behav..

[28]  D. Blumenthal,et al.  The benefits of health information technology: a review of the recent literature shows predominantly positive results. , 2011, Health affairs.

[29]  Carlo Perrotta,et al.  Do school-level factors influence the educational benefits of digital technology? A critical analysis of teachers' perceptions , 2013, Br. J. Educ. Technol..

[30]  F. Whittaker,et al.  The costs and benefits of technology-enabled, home-based cardiac rehabilitation measured in a randomised controlled trial , 2014, Journal of telemedicine and telecare.

[31]  A. Hourani Europe and the Middle East , 1980 .

[32]  J. Straub Mutual assured destruction in information, influence and cyber warfare: Comparing, contrasting and combining relevant scenarios , 2019, Technology in Society.

[33]  J. Mueller,et al.  Pearl Harbor: Military Inconvenience, Political Disaster , 1991 .

[34]  James Kinross,et al.  Effective cybersecurity is fundamental to patient safety , 2017, British Medical Journal.

[35]  Jeremy Straub,et al.  Modeling Attack, Defense and Threat Trees and the Cyber Kill Chain, ATT&CK and STRIDE Frameworks as Blackboard Architecture Networks , 2020, 2020 IEEE International Conference on Smart Cloud (SmartCloud).

[36]  T. Stevens Cyber Security and the Politics of Time , 2015 .

[37]  Li Hu-sheng Research on new model of the emergency management phase theory , 2010 .

[38]  R. Atkinson,et al.  Digital Quality of Life: Understanding the Personal and Social Benefits of the Information Technology Revolution , 2008 .

[39]  R. Still,et al.  Europe and the Middle East , 2013 .