What makes stuxnet different from other cyberwarfare attacks

Assignment Help Electrical Engineering
Reference no: EM131230333

STUXNET AND THE CHANGING FACE OF CYBERWARFARE

In July 2010, reports surfaced about a Stuxnet worm that had been targeting Iran's nuclear facilities. In November of that year, Iran's President Mahmoud Ahmadinejad publicly acknowledged that malicious software had infected the Iranian nuclear facilities and disrupted the nuclear program by disabling the facilities' centrifuges. Stuxnet had earned its place in history as the first visible example of industrial cyberwarfare. To date, Stuxnet is the most sophisticated cyberweapon ever deployed. Stuxnet's mission was to activate only computers that ran Supervisory Control and Data Acquisition (SCADA) software used in Siemens centrifuges to enrich uranium. The Windows-based worm had a "dual warhead." One part was designed to lay dormant for long periods, then speed up Iran's nuclear centrifuges so that they spun wildly out of control. Another secretly recorded what normal operations at the nuclear plant looked like and then played those recordings back to plant operators so it would appear that the centrifuges were operating normally when they were actually tearing themselves apart. The worm's sophistication indicated the work of highly skilled professionals. Michael Assante, president and CEO at the National Board of Information Security Examiners, views Stuxnet as a weapons delivery system like the B-2 Bomber. The software program code was highly modular, so that it could be easily changed to attack different systems. Stuxnet only became active when it encountered a specific configuration of controllers, running a set of processes limited to centrifuge plants. Over 60 percent of Stuxet-infected computers are in Iran, and digital security company Kaspersky Labs speculates that the worm was launched with nationstate support (probably from Israel and the United States) with the intention of disabling some or all of Iran's uranium enrichment program. Stuxnet wiped out about one-fifth of Iran's nuclear centrifuges. The damage was irreparable and is believed to have delayed Iran's ability to make nuclear arms by as much as five years. And no one is certain that the Stuxnet attacks are over. Some experts who examined the Stuxnet software code believe it contains the seeds for more versions and attacks. According to a Tofino Security report, Stuxnet is capable of infecting even well-secured computer systems that follow industry best practices. Companies' need for interonnectivity between control systems make it nearly impossible to defend against a wellconstructed, multi-pronged attack such as Stuxnet. And Stuxnet is not the only cyberweapon currently at work. The Flame virus, released about five years ago, has been infecting computers in Iran, Lebanon, Sudan, Saudi Arabia, Egypt, Syria, and Israel. While researchers are still analyzing the program, the attack's main goal is stealing information and espionage. Flame is able to grab images of users' computer screens, record their instant messaging chats, collect passwords, remotely turn on their microphones to record audio conversations, scan disks for specific files, and monitor their keystrokes and network traffic. The software also records Skype conversations and can turn infected computers into Bluetooth beacons which attempt to download contact information from nearby Bluetoothenabled devices These data, along with locally stored documents, can be sent to one of several command and control servers that are scattered around the world. The program then awaits further instructions from these servers. The Duqu worm, discovered in September 2011, also aims to steal information by scanning systems. Duqu infects a very small number of very specific systems around the world, but may use completely different modules for infiltrating those separate systems. One of Duqu's actions is to steal digital certificates used for authentication from attacked computers to help future viruses appear as secure software. It is going largely undetected. Security researchers believe Duqu was created by the same group of programmers behind Stuxnet. The real worry for security experts and government officials is an act of cyberwarfare against a critical resource, such as the electric grid, financial systems, or communications systems. (In April 2009, cyberspies infiltrated the U.S. electrical grid, using weak points where computers on the grid are connected to the Internet, and left behind software programs whose purpose is unclear, but which presumably could be used to disrupt the system.) The U.S. has no clear strategy about how the country would respond to that level of cyberattack, and the effects of such an attack would likely be devastating. Mike McConnell, the former director of national intelligence, stated that if even a single large American bank were successfully attacked, it would have an order-of-magnitude greater impact on the global economy than the World Trade Center attacks, and that the ability to threaten the U.S. money supply is the financial equivalent of a nuclear weapon. Many security experts believe that U.S. cybersecurity is not well-organized. Several different agencies, including the Pentagon and the National Security Agency (NSA), have their sights on being the leading agency in the ongoing efforts to combat cyberwarfare. The first headquarters designed to coordinate government cybersecurity efforts, called Cybercom, was activated in May 2010 in the hope of resolving this organizational tangle. In May 2011 President Barack Obama signed executive orders weaving cyber capabilities into U.S. military strategy, but these capabilities are still evolving. Will the United States and other nations be ready when the next Stuxnet appears?

Case Study Question

1. Is cyberwarfare a serious problem? Why or why not?

2. Assess the management, organization, and technology factors that have created this problem.

3. What makes Stuxnet different from other cyberwarfare attacks? How serious a threat is this technology?

4. What solutions for have been proposed for this problem? Do you think they will be effective? Why or why not?

Reference no: EM131230333

Questions Cloud

Describe the kinds of applications that use them : Why are RFID and wireless sensor networks (WSNs) valuable for business?
What impact did this film have on society : What impact did this film have on society? - The impact can be as major as inspiring political or social changes or as minor as inspiring the production of toys or lunchboxes.
About the experience of customization of web site : What do you think about the experience of customization of a web site to cater to customers? Is necessary or important that each user is believes or set a profile in where you enter to a website recognized their latest activities or tastes of shoppin..
How much extra income would the government have to give him : How much extra income would the government have to give him ? With this income and the new prices, what quantities will the consumer actually buy? What will be his resulting utility?
What makes stuxnet different from other cyberwarfare attacks : What solutions for have been proposed for this problem? Do you think they will be effective? Why or why not?
Why data quality audits and data cleansing are essential : Why are information policy, data administration, and data quality assurance essential for managing the firm's data resources?
Economic order quantity of lamps the for distribution center : The Target Company imports brass lamps from China. Weekly demand at Target’s distribution center for lamps is normally distributed with an average of 4000 and a standard deviation of 1200. Each lamps costs $100. What is the economic order quantity of..
Describe the capabilities of online analytical processing : What are the principal tools and technologies for accessing information from databases to improve business performance and decision making?
Historically high rates of infant mortality : A policy may be put into place that increases access to fetal and maternal medicine for American Indians, due to their historically high rates of infant mortality. This is a frequently debated topic in politics. Some believe that there should be heal..

Reviews

Write a Review

Electrical Engineering Questions & Answers

  Lithium ion battery technology

The paper includes Lithium ion battery technology with its advantages and disadvantages. The paper discusses about the Lithium air battery in which detailed reactions of Lithium with air including nonaqueous as well as aqueous are given.

  Power transformers and tariffs

Construction of different types of power transformer, significant energy savings

  Paper on orthogonal frequency-division multiplexing

This document is shown a paper on Orthogonal frequency-division multiplexing with advantages, disadvantages and uses.

  Function of the hmi in a scada system

This assignment contains electronics engineering questions like State the commonly found components of a SCADA (Supervisory control and data acquisition) system. and decribe the function of the HMI in a SCADA system.

  Resultant waveform of the odd harmonic series

Prepare an Excel graph showing the individual components and summated resultant waveform of the odd harmonic series resulting in an approximate square wave.

  Explain scada system

Explain the function of the HMI in a SCADA system.

  Design a 2-digit 24 second shot-clock

Design a 2-digit 24 second "shot-clock" countdown timer with pushbutton controller.

  Model a discrete-time system

To understand di erent signal models To be able to model a discrete-time system and design simple signal processing algorithms.

  Draw a relay construction diagram

Draw a relay construction diagram and briefly explain the operation of a relay.

  Frequency division multiplexing

Write a short technical report on Frequency Division Multiplexing

  Impact of electron energy

Briefly discuss the impact of electron energy, electron current and target on the Bremsstrahlung generated.

  Traffic light controller

The schematic of the traffic light controller

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd