Analyze the anatomy of stuxnet

Assignment Help Management Information Sys
Reference no: EM131808384 , Length: 5

In June 2010, Stuxnet, a complex and highly sophisticated computer worm was discovered by Kaspersky Lab. Stuxnet targeted Siemens industrial Supervisory Control and Data Acquisition (SCADA) systems.

It was reported that the worm appeared to target Iran's uranium enrichment infrastructure. Most computer worms and viruses tend to target consumer systems such as desktop computers and laptop computers.

You can learn more about Stuxnet at

Write a four to five (4-5) page paper in which you:

Analyze the level of security requirements between industrial systems and consumer devices such as desktop computers. Address if they should be the same or different.

Analyze the anatomy of Stuxnet and how it was able to damage Iran's SCADA systems.

Evaluate the lessons that were learned from Stuxnet about the vulnerability of Iran's SCADA systems. Suggest how the attacks could have been prevented.

Provide five (5) guidelines that should be used to reduce a network's attack surface for industrial control systems.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Define authorization and access to an IT infrastructure based on an access control policy framework.

Describe methods that mitigate risk to an IT infrastructure's with confidentiality, integrity, availability and access controls

Use technology and information resources to research issues in access control.

Write clearly and concisely about topics related to Security Access & Control Strategies using proper writing mechanics and technical style conventions.

Reference no: EM131808384

Questions Cloud

Summary and review of seven of the articles : Inflation Targets Reconsidered Paul Krugman Draft paper for ECB Sintra conference, May 2014 This paper is under transmission embargo until the end of session
Confidence interval for the mean weight of all loaves : Your bakery produces loaves of bread with "1 pound" written on the label. Here are weights of randomly sampled loaves from today's production.
Data points about demand for healthcare : Suppose from your randomized experiment you observed two data points about demand for healthcare:
Identify related parties and party transactions For Nike : ASSIGNMENT - ACCOUNTING FOR CORPORATE STRUCTURES. For Nike Australia Pty Ltd, identify the related parties and the related party transactions
Analyze the anatomy of stuxnet : Evaluate the lessons that were learned from Stuxnet about the vulnerability of Iran's SCADA systems. Suggest how the attacks could have been prevented.
Find mean expenditure per person in the larger population : A market survey has shown that people will spend an average of $15.48 each for your product next year, based on a sample survey of 483 people.
Discuss how and when the dividend would be recorded : Cheques are email to shareholders 1 month from the day of approval. Discuss how and when the dividend would be recorded
What is the appropriate tax treatment of the net gain : What is the appropriate tax treatment of the net gain or loss (ie, capital gain/loss treatment, ordinary deduction for AGI, or treatment as ordinary income)?
Obtaining cleaning cost from a random sample : The following quotes for cleaning cost have been obtained from a random sample of 12 providers chosen from a much larger population.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Prepare the rfp you need to consider the main sections

Whether the system will be developed in-house, use package software, or be outsourced, a Request for Proposal (RFP) must be prepared to solicit quotes from vendors. The primary purpose is to communicate with vendors and rank software and hardware ..

  Exactly what types of security risks you have to face

What are the most important steps you would recommend for securing a new Web server?

  Explain how the data collected in the project stakeholders

Explain how the data collected in the Project Stakeholders table could assist the project management team in defining the project scope

  Question about too much informationtechnology can give us

question about too much informationtechnology can give us answers as fast as we can type. it can also vastly increase

  Evaluate three online collaboration tools

The purpose of this assignment is to familiarize students with the multiple collaboration tools available. Students will evaluate three online collaboration tools and choose one to suit their needs.

  Challenge in any of the project management process

You are a project manager managing an IT project. What is your top challenge in any of the project management process? and why

  Conduct a literature review of what security policies are

Conduct a literature review of what security policies are and from the literature develop a set of Guidelines for organisations

  Draft an executive summary to the dr plan

Consider a scenario where the contingency planning management team (CPMT) of your organization has designated you as the disaster recovery team leader.

  Describe the context in which the balanced scorecard

Describe the context in which the Balanced Scorecard and the IT framework would be used. The paper should 3-4 pages in APA format.

  Research paper - social media and culture management

Research paper,  Topic: Social Media and Culture Management. Define the Human Resources/Human Capital Management issue or problem

  Creation of the personal computing estore

FIT5094 IT for Management Decision Making Semester 1, 2017 Assignment - Personal Decision Support. Creation of the Personal Computing eStore (PCeS)

  Parker earth moving potential problem with new

parker earth moving potential problem with new technologybackgroundparker earth moving company has not kept pace with

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd