Preview

Information Technology Case Analysis

Good Essays
Open Document
Open Document
357 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Technology Case Analysis
Chapter 7 IT’s about business 2

1. Describe the implications of the precisely targeted nature of the Stuxnet attack.
Stuxnet was made based on the Siemens SCADA systems. Iran and a few other countries use that system for their nuclear or power plant power. The first inspection of the virus showed that the programmers had avery good knowledge of the SCADA systems. Also it spread out by USB ports instead of Internet, that was because the Natanz facility had no connection with the internet and the only way of transferring data was memory and flash cards. and the majority of the 30,000 infected IPs were placed in Iran. So some spy should bring that worm to a company inside Iran that had a close relationship or a contract with Natanz enrichment facility and that might be the start of spreading the virus. Some experts believe that it took about six month for the worm to reach its target. They believe that the form first gathered good information of the facility and a map of internal network and sent it out in the same way. Then by a trigger it starts to act. Also the action of worm was to slow down and then speed up the centrifuges by sudden to destroy the enrichment process. These facts together make the belief among experts that Iranian enrichment facilities were the only target of the worm. 2. What does the statement mean that “nations use malware such as the Stuxnet worm when their only alternative is to go to war.”
It shows the power of malwares and how they can be used as a weapon to destroy enemy’s abilities. The terms Cyber war, cyber-attacks, and cyber-defense also shows the power of this malwares and how countries rely on them to understand the enemy’s power and destroy that. There was another worm after Stuxnet, named Flame that was data mining all Iranian computers to find valuable information and send that to unknown servers in different countries. Some experts call these malwares cyber-weapons. A reports shows that the use of malware

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT260 unit 1 assignment 1

    • 624 Words
    • 3 Pages

    Botnet - Attackers use botnets to automatically run and distribute malicious software on “agent” servers. They are commonly used in DDoS attacks and spam campaigns.…

    • 624 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It Case Study

    • 449 Words
    • 2 Pages

    The Widget Wonders distribution center is the worldwide leader in widgets. Which they're in the process of building a state of art facility to manufacture new generation of widgets. The SNHUConsulting group leads the way of consulting in information technology. SNHUConsulting has been hired to consult on new hardware that will last for at least the next three years for the different apartments.…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Powerful Essays

    BUS 520 Case 1 1

    • 1885 Words
    • 6 Pages

    The computer virus employees of Symantec Corp. are never able to enjoy a finished product. They are constantly collecting viruses and suspicious codes to analyze the way they work and to find a solution to prevent these viruses form damaging the public’s computers. They are determined to provide their consumers with updated versions of anti-viruses for their computers. At the Symantec lab, they have a box, which has all dangerous types of viruses that needs or be disposed of. Vincent Weafer has been a part of Symantec since 1999. In 1999, there were only a few employees at Symantec and that there were only a few viruses spread out through months compared to how it is now. Nowadays there are about 20,000 viruses monthly spread out, so more talented employees around the world work for Symantec. Vincent Weafer said that colleges are not creating computer security experts everyday so as soon as they find someone who does, that no matter in what country they hire him or her. The Blaster-B worm made Symantec employees work really hard and this proved that they needed more employees would be more talented towards fixing these problems. Each employee has their own job; some people are managers who are responsible for responding to new security threats, some write research papers, some develop tools that will be used to fight the viruses and even some who find out about the new viruses. Symantec never stops meaning that the labs switch when they are done for the day. Vincent Weafer wants to have a well-defined process for dealing with the viruses that are found every day.…

    • 1885 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Case Study Analysis

    • 727 Words
    • 3 Pages

    Officer Smith did have reasonable suspicion to make the initial vehicle stop. The taillight appeared to have been broken and there was colored tape so there was probable cause to pull the driver over. Police Officers may pull a vehicle over for many reasons like traffic violations, equipment violations and even suspicious activity whenever they have a reasonable articulable suspicion that a public offense is occurring or has occurred.…

    • 727 Words
    • 3 Pages
    Good Essays
  • Good Essays

    The early version of Stuxnet either had to be installed on a computer or installed via a USB drive that contained infected configuration files for Siemens controllers. When the file was opened by engineering software, the computer was infected (Langner, 2013). However, if there was no engineering software to open the infected file, nothing would happen. Thus, a new version was created. The second version contained self-replication code that allowed it to spread on networks and via USB drives until it got to the computers running the engineering software. Since this version of Stuxnet was self-replicating, it made it possible to infiltrate and identify nuclear sites that the…

    • 958 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Case Study Analysis

    • 607 Words
    • 3 Pages

    In the case of Honig v. Doe, it was the first case to reach the Supreme Court dealing with discipline of special education students. This case took place in 1988 after two students from the San Francisco School District with emotional disabilities and aggressive tendencies were threatened with expulsion. John Doe (a pseudonym) was a socially and physically awkward 17 year-old who had difficulty controlling his impulses and anger. From early on in school, physical abnormalities, speech difficulties, and poor grooming habits resulted in his being the target of classmates teasing and ridiculing him. One day, in response to taunts from a fellow student at a developmental center for disabled students, he reacted in an explosive manner anticipated by his individualized education (IEP). He choked a student with enough force to leave abrasions on the boy’s neck. Afterwards, while being taken to the principal’s office, John kicked out a window. John was suspended from school for 5 days. The principal recommended that he be expelled. A lawsuit was filed, and the federal district court issued a temporary order directing the school to return John to his then current educational placement.…

    • 607 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    CASE STUDY ANALYSIS

    • 559 Words
    • 5 Pages

    CASE STUDY ANALYSIS LEARNING TEAM C ALLISON CARINCI, AMIE HOUGHEN, BRENDA COTHRAN, JESSICA BUNCH, KARA VISATHEP, AND LAKISHA CHESTER APRIL 26, 2015 UNIVERSITY OF PHOENIX HCS/449 RENEE GORBY INTRODUCTION  Analyze the challenges faced by the health care organization in the case study.  Analyze the role each stakeholder has in the strategies to address the challenges of the health care organization in the case study.…

    • 559 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Certain cyber crimes have the potential of becoming more severe, leading to cyber warfare. Cyber warfare are actions made by another state or nation to cause disruption or damage to another state or nations networks or computers. Government infrastructures are at risk for cyber-related…

    • 1134 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Agencies are required to evaluate proposals based solely on the evaluation factors identified in the solicitation. Furthermore, according to Federal Acquisition Regulations, they must adequately document the reasons for their evaluation conclusions (FAR§ 15.308). GAO recommended to the agency was to, at a minimum reevaluate both proposals to ascertain if they were evaluated based on the evaluation factors and to determine if adequate rationale were articulated.…

    • 556 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    Power Grid

    • 1857 Words
    • 5 Pages

    But with all the good that comes from information technology there is also bad. The internet has also become a gateway for hackers to wreak havoc. In a nutshell, cyber-crime has become a headache in the 21st century because one individual can remotely attack any online system from any corner of the world crippling many economic developments. Even before the federal government can come up with effective ways of protecting its citizen from cyber-crime vulnerability, a new problem which can bring about devastating effects of equal measure has emerged. One such problem is the vulnerability of the nation’s power grid. The government had turned all of its attention to measures of countering cyber terrorism to an extent that it forgot that physical attacks on sources of power, which run these systems, could also bring equally devastating effects (Besanger et al 2013).…

    • 1857 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Irls

    • 2330 Words
    • 10 Pages

    “Cyber terrorism has become one of the most significant threats to the national and international security of the modern state, and cyber attacks are occurring with increased frequency. The Internet not only makes it easier for terrorists to communicate, organize terrorist cells, share information, plan attacks, and recruit others but also is increasingly being used to commit cyber terrorist acts. It is clear that the international community may only ignore cyber terrorism at its peril.” (Kelly G. 2010)…

    • 2330 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    In the attack side, it also include that the background why Cyber Command had aroused the international concern. In 2010, It has waged cyberwar. US Cyber Command postponed the development of nuclear weapon of Iran. It involves hacking and attack. This aggressive action had aroused international concern.…

    • 1665 Words
    • 7 Pages
    Good Essays
  • Good Essays

    It255 Iloveyou Virus

    • 387 Words
    • 2 Pages

    Virus stared in Manila, Philippines on May 5th 2000, it moved to Hong Kong then Europe and then finally the US. As employees began their workday that Friday morning virus have already caused US $5.5 to 8.7 Billion in damages worldwide and estimated to cost US $15 billion to remove the worm within ten days. Over fifty million infection had been reported, it was reported that 10% of internet-connected computers in the world. Damaged cited was mostly the time and effort spent getting rid of the infection and recovering files form back up. To protect them, The Pentagon, CIA, The British Parliament and most large corporation decided to completely shut down their mail system.…

    • 387 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Technological paradigms

    • 3649 Words
    • 15 Pages

    Christensen, C., & Rosenbloom, R. (1995). Explaining the attackers 's advantage: Technological paradigms organizational dynamics, and the value network. . Research policy, 24, 233-257.…

    • 3649 Words
    • 15 Pages
    Powerful Essays