Introduction

Origins

The story of INL’s methodology—consequence-driven, cyber-informed engineering (CCE)—begins in 1986 when Clifford Stoll, an astrophysicist-in-training at Lawrence Berkley National Lab in California, senses someone else was in his computer, so to speak, and begins a hunt that leads to the identification of a hacker operating out of West Germany. This marks the first documented cyberattack over information technology (IT) infrastructure and over ensuing years, a flood of sometimes sophisticated, often pedestrian, and eventually automated attacks followed.1

The following two decades witnessed the birth and expansion of what is now a well over $100 billion (USD) global IT-focused cybersecurity tool and service industry. Over ...

Get Countering Cyber Sabotage now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.