Sign In
Not register? Register Now!
Pages:
2 pages/β‰ˆ550 words
Sources:
3 Sources
Style:
APA
Subject:
Technology
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 10.8
Topic:

Network Security

Essay Instructions:

Stuxnet: Dissecting a Cybewarfare Weapon
Cyberwarfare has been in the mainstream discussion of cybersecurity journals and conference proceedings for a few years. The Stuxnet attack ihas caused many politicians and security professionals to have increased concern for future cybersecurity. Attached to this project is an IEEE journal article that you need to read, analyze, and write your own paper to express your reaction on this important cybersecurity topic. You should also refer to at least three other outside sources to complete and support your paper.
Your paper should include at a minimum:
• Introduction
• Technical analysis of the paper topic, content, implications, and conclusions.
• Your reflection on the paper
• Make your case in the defensive and offensive Cyberware strategy
• Recommendation to prevent future Cyberware attacks as Stuxnet
• A list of references

Essay Sample Content Preview:

Network Security
Student Name
Students course
Name of the Institution
Date
Cyber warfare is a form of information war deliberately aimed at weakening a policy or corporation through subversion, obstruction, disruption or destruction. Cyber warfare targets and attempts to damage information networks and digital infrastructure through computer viruses and denial of service attacks. Cyber warfare can also be characterized by the practice of obtaining information without the permission of the owner, typically by governments to get political and military information by applying cracking techniques and malicious software. This is carried out purely for the purpose of gaining a strategic advantage and for physiological, political and physical subversion activities (Poroshyn, 2014). Stuxnet is a worm that came to the limelight in 2010, was designed to attack industrial programmable logic controllers, it is believed to have three models: a worm that that executes all routines related to the primary payload of attack, a link file that automatically runs the propagated copies of the worm and finally a rootkit component responsible for hiding all malicious files and processes thereby inhibiting any detection of Stuxnet (Rebane, 2011). Contrary to expectations Stuxnet was not about industrial spying, it didn’t steal, destroy or erase processed or raw data. This worm was truly an unprecedentedly masterful and malicious piece of code. Its goal was to manipulate a military target physically. It was carefully designed to infect any windows PC it would get however it was much pickier on controllers. A controller program also known as ladder logic operates purely on physics whereas a computer program specifically operates on information (Rebane, 2011). Stuxnet targeted Siemens controllers; it went through a rigorous and thorough process of fingerprinting to ascertain its accuracy. The process included checking model numbers, configuration details and more interesting it downloaded a program code from the said controller to check if i...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!