Preview

Mit Week 5

Better Essays
Open Document
Open Document
1020 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mit Week 5
The Stuxnet digital assault on the Iranian Nuclear facilities at Natanz is seen by a lot of people as the first genuine digital weapon. This makes Stuxnet's super vitality as an issue unparalleled in present day digital world and particularly worth a debate. Lessons gained from the Stuxnet digital assault empower brainpower and the internet experts, as digital chiefs, to better work inside the area. Programmers around the world appear to be constantly programming security programs, for which states pay billions of dollars. Though the vulnerability of intrusion has leapt into the world cyberspace with Stuxnet and has left nothing secured.
1. Why is the Stuxnet event considered to be historic?
Stuxnet has a taken the modern warfare into a new level as a whole. Stuxnet has shown that there is no such thing as "flawless" IT security. By good or bad Stuxnet is considered historic because it is the first instance that a country and its cyberspace was targeted and crippled temporarily. Stuxnet has directly dealt a lethal blow on Iran’s nuclear facilities and its oil export facilities for a while. The ever-daunting question of keeping a check on the cyberspace privacy or security has been brought up in the world stage with Stuxnet.
2. What is a danger that the creators of Stuxnet have created for other industrial counties, including the United States? What is the greatest fear created by Stuxnet?
The dilemma and peril that haunt the creators of Stuxnet is they have left the whole world vulnerable with the same way they have infiltrated into other country’s space and privacy that everyone seeks them-selves. This can change the conventional warfare methods and move more towards hazardous and contaminated methods of warfare each trying to create uncertainty and pandemonium into others cyberspace. Stuxnet has viably shot the first bullet in another weapons contest that is prone to prompt the spread of comparative and still all the more compelling hostile cyber weaponry over



References: 1, Glenny, M. (2012, June 24). A Weapon We Can’t Control. The New York Times. Retrieved from http://www.nytimes.com/2012/06/25/opinion/stuxnet-will-come-back-to-haunt-us.html?_r=0 2, Markoff, J., Sanger, D. E., & Broad, W. J. (2011, January 15). Stuxnet Worm Used Against Iran Was Tested in Israel. The New York Times. Retrieved from http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html 3, Terdiman, D. (2012, April 13). Stuxnet delivered to Iranian nuclear plant on thumb drive. Retrieved from http://www.cbsnews.com/news/report-stuxnet-delivered-to-iranian-nuclear-plant-on-thumb-drive/

You May Also Find These Documents Helpful

  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    Gates, Gilbert. "How a Secret Cyberwar Program Worked." The New York Times, June 1, 2012. http://www.nytimes.com/interactive/2012/06/01/world/middleeast/how-a-secret-cyberwarprogram-worked.html?ref=middleeast…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Satisfactory Essays

    This article discusses Homeland Security's decision to renew Raytheon's contract as its cyber protector. In September Raytheon was picked as the main contractor for the Network Security Deployment division. This new contract is directly influenced by the companies new plans to prioritize cyber security as just last year the Office of Personnel Management was hacked, leaving data on 21.5 million people comprised. Moreover, in January of this year, a report on Homeland's cyber security admitted to limitations in ability to detect possible malware. Overall, cyber security is a controversial issue. An example of this is the debate surrounding the unlocking of a terrorist's iPhone in December, which Apple refused to do.…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    IS4560 Graded Assingments

    • 5563 Words
    • 23 Pages

    This particular report provides information on cutting edge and growing threats to Internet security. Using the background provided by the class so far, as well as your own critical thinking skill, you need to write a summary of the top threats described in the whitepaper. Explain why the threats are important issues and how these threats have changed or are changing.…

    • 5563 Words
    • 23 Pages
    Powerful Essays
  • Good Essays

    The Stuxnet attack was not executed to steal or erase information. It was carried out to physically destroy a military target; Iran’s Natanz nuclear facility. The attack was aimed at industrial SCADA controllers and was a stand-alone attack. It was not an attack that required access to the Internet. The attackers relied on local networks and USB drives to carry out the attack. It targeted Siemens controllers and underwent a complex process to make sure that it found the correct target. Once the target was found, malicious code was entered into the controller, which caused their centrifuges to become over-pressurised and break more easily. The attack was also meant to be limited to Natanz, but it eventually spread to approximately 100,000 other controllers and systems worldwide. Langner proposed that the best solution to prevent future physical attacks is to monitor controllers for changes by using independent drivers.…

    • 958 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    References: Brenner, Joel (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. New York: The Penguin Press…

    • 4009 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    The most prominent threat in contemporary society is the effects of the War of Terror, such as 9/11 and the influences of Islamic State of Iraq and Syria, or ISIS. However, there is an emerging terrorism threat to the United States that President Obama had to start dealing with. This is the threat of domestic cyber-security not being maintained and sustained. President Obama once gave a speech at the 2015 Cyber-security and Consumer Protection Summit in Stanford California’s honored university.…

    • 474 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The article “Inside America’s Hacking Epidemic,” shows the destructive power and capability of cyberwarfare. Cyberwarfare has grown increasingly common over the years, and is one of the few areas where combat is on a level playing field. With the widespread use and access to internet, hackers and cases of hacking are continuing to grow at an alarming rate. Not only, but these hacks are usually targeted at important government facilities like the Pentagon, State Department, and the White House. Attacks substantial as this not only have the capability breach classified information, but they also carry a large risk of harming the infrastructure and national security.…

    • 445 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    “We are now faced with a combination of new and traditional actors, a widened set of motivations and tactics, organizational structures and principles, as well as a wider range of threats along the technological spectrum, especially with the increased potential for the terrorists use of weapons of mass destruction. Counter terrorism must deal with a wider range of threats…

    • 2278 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    i. Contemporary terrorist organizations are harmonizing their activities with scientific and technological discoveries, and in particular with the Internet and communication technologies. Collectively, this phenomenon is known as mega-terrorism.…

    • 1993 Words
    • 6 Pages
    Good Essays
  • Good Essays

    There have been recent technological advances that have brought with them significant benefits to society, but there has always been a negative aspect to it. The internet is a new technological innovation that has changed a lot of people’s lives. The internet also has its dangers to the people who use it. All computer systems are globally inter-connected, and therefore are vulnerable to forms of attack. People have feared of attacks since September 11, 2001 when the New York World Trade Center was attacked where the media said this not only opened us to physical attacks, but also virtual attacks. If we were to be virtually attacked the attackers would most likely go for our critical infrastructure’s such as energy, finance, transportation, and other essential services. These potential dangers are taken very seriously, and the United States has procedures to stop them from happening.…

    • 940 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Cyber security became ever more crucial for global business and modern society. We are living in a data-centric world in which information technology and associated communications ' systems as well as networks that provide goods and services permeate every facet of our lives. This creates the safeguard of our digital assets and activities within cyberspace of critical importance, whether for individual life experience or a prosperous and sustainable society. But the challenge to understand cyber risk and deliver effective and accessible security becomes harder as technology continues to rapidly evolve and our systems become ever more complex. We are increasingly dependent upon such information and communications infrastructures, and the threats we face are organised and evolving the skills to exploit our dependency to further their interests.…

    • 3699 Words
    • 15 Pages
    Best Essays
  • Better Essays

    Power Grid

    • 1857 Words
    • 5 Pages

    But with all the good that comes from information technology there is also bad. The internet has also become a gateway for hackers to wreak havoc. In a nutshell, cyber-crime has become a headache in the 21st century because one individual can remotely attack any online system from any corner of the world crippling many economic developments. Even before the federal government can come up with effective ways of protecting its citizen from cyber-crime vulnerability, a new problem which can bring about devastating effects of equal measure has emerged. One such problem is the vulnerability of the nation’s power grid. The government had turned all of its attention to measures of countering cyber terrorism to an extent that it forgot that physical attacks on sources of power, which run these systems, could also bring equally devastating effects (Besanger et al 2013).…

    • 1857 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Homeland Security Threats

    • 887 Words
    • 4 Pages

    The United States safety and wellbeing relies on a resilient critical infrastructure, which is the assets, systems and networks that underpin American society. There are three different categories of threats. Natural threats, human- cause and accidental/technical threat. “Natural threats include weather problems in both hot and cold climates and also geological hazards like earthquakes, tsunamis, 18 International Journal of Control and Automation land shifting and volcanic eruption.” (Robles, Choi, Cho, Kim, G Park, Lee) The human caused threats are referred to as terrorism. “This may include cyber-attacks, rioting, product tampering, explosions and bombing.” (Robles, Choi, Cho, Kim, G Park, Lee) Technological threats are completely different;…

    • 887 Words
    • 4 Pages
    Good Essays
  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Although, technology has increased our chances in becoming a vital nation, it has made the United States of America a target. Other nations, has and will continue to receive hostile measures to attempt to steal technological information at all cost; this is the same technology the United States Citizens and their counterpart have worked so hard to build and advance their nation’s ability.…

    • 273 Words
    • 2 Pages
    Satisfactory Essays