What makes stuxnet different from other cyberwarfare attacks

Assignment Help Electrical Engineering
Reference no: EM131230333

STUXNET AND THE CHANGING FACE OF CYBERWARFARE

In July 2010, reports surfaced about a Stuxnet worm that had been targeting Iran's nuclear facilities. In November of that year, Iran's President Mahmoud Ahmadinejad publicly acknowledged that malicious software had infected the Iranian nuclear facilities and disrupted the nuclear program by disabling the facilities' centrifuges. Stuxnet had earned its place in history as the first visible example of industrial cyberwarfare. To date, Stuxnet is the most sophisticated cyberweapon ever deployed. Stuxnet's mission was to activate only computers that ran Supervisory Control and Data Acquisition (SCADA) software used in Siemens centrifuges to enrich uranium. The Windows-based worm had a "dual warhead." One part was designed to lay dormant for long periods, then speed up Iran's nuclear centrifuges so that they spun wildly out of control. Another secretly recorded what normal operations at the nuclear plant looked like and then played those recordings back to plant operators so it would appear that the centrifuges were operating normally when they were actually tearing themselves apart. The worm's sophistication indicated the work of highly skilled professionals. Michael Assante, president and CEO at the National Board of Information Security Examiners, views Stuxnet as a weapons delivery system like the B-2 Bomber. The software program code was highly modular, so that it could be easily changed to attack different systems. Stuxnet only became active when it encountered a specific configuration of controllers, running a set of processes limited to centrifuge plants. Over 60 percent of Stuxet-infected computers are in Iran, and digital security company Kaspersky Labs speculates that the worm was launched with nationstate support (probably from Israel and the United States) with the intention of disabling some or all of Iran's uranium enrichment program. Stuxnet wiped out about one-fifth of Iran's nuclear centrifuges. The damage was irreparable and is believed to have delayed Iran's ability to make nuclear arms by as much as five years. And no one is certain that the Stuxnet attacks are over. Some experts who examined the Stuxnet software code believe it contains the seeds for more versions and attacks. According to a Tofino Security report, Stuxnet is capable of infecting even well-secured computer systems that follow industry best practices. Companies' need for interonnectivity between control systems make it nearly impossible to defend against a wellconstructed, multi-pronged attack such as Stuxnet. And Stuxnet is not the only cyberweapon currently at work. The Flame virus, released about five years ago, has been infecting computers in Iran, Lebanon, Sudan, Saudi Arabia, Egypt, Syria, and Israel. While researchers are still analyzing the program, the attack's main goal is stealing information and espionage. Flame is able to grab images of users' computer screens, record their instant messaging chats, collect passwords, remotely turn on their microphones to record audio conversations, scan disks for specific files, and monitor their keystrokes and network traffic. The software also records Skype conversations and can turn infected computers into Bluetooth beacons which attempt to download contact information from nearby Bluetoothenabled devices These data, along with locally stored documents, can be sent to one of several command and control servers that are scattered around the world. The program then awaits further instructions from these servers. The Duqu worm, discovered in September 2011, also aims to steal information by scanning systems. Duqu infects a very small number of very specific systems around the world, but may use completely different modules for infiltrating those separate systems. One of Duqu's actions is to steal digital certificates used for authentication from attacked computers to help future viruses appear as secure software. It is going largely undetected. Security researchers believe Duqu was created by the same group of programmers behind Stuxnet. The real worry for security experts and government officials is an act of cyberwarfare against a critical resource, such as the electric grid, financial systems, or communications systems. (In April 2009, cyberspies infiltrated the U.S. electrical grid, using weak points where computers on the grid are connected to the Internet, and left behind software programs whose purpose is unclear, but which presumably could be used to disrupt the system.) The U.S. has no clear strategy about how the country would respond to that level of cyberattack, and the effects of such an attack would likely be devastating. Mike McConnell, the former director of national intelligence, stated that if even a single large American bank were successfully attacked, it would have an order-of-magnitude greater impact on the global economy than the World Trade Center attacks, and that the ability to threaten the U.S. money supply is the financial equivalent of a nuclear weapon. Many security experts believe that U.S. cybersecurity is not well-organized. Several different agencies, including the Pentagon and the National Security Agency (NSA), have their sights on being the leading agency in the ongoing efforts to combat cyberwarfare. The first headquarters designed to coordinate government cybersecurity efforts, called Cybercom, was activated in May 2010 in the hope of resolving this organizational tangle. In May 2011 President Barack Obama signed executive orders weaving cyber capabilities into U.S. military strategy, but these capabilities are still evolving. Will the United States and other nations be ready when the next Stuxnet appears?

Case Study Question

1. Is cyberwarfare a serious problem? Why or why not?

2. Assess the management, organization, and technology factors that have created this problem.

3. What makes Stuxnet different from other cyberwarfare attacks? How serious a threat is this technology?

4. What solutions for have been proposed for this problem? Do you think they will be effective? Why or why not?

Reference no: EM131230333

Questions Cloud

Describe the kinds of applications that use them : Why are RFID and wireless sensor networks (WSNs) valuable for business?
What impact did this film have on society : What impact did this film have on society? - The impact can be as major as inspiring political or social changes or as minor as inspiring the production of toys or lunchboxes.
About the experience of customization of web site : What do you think about the experience of customization of a web site to cater to customers? Is necessary or important that each user is believes or set a profile in where you enter to a website recognized their latest activities or tastes of shoppin..
How much extra income would the government have to give him : How much extra income would the government have to give him ? With this income and the new prices, what quantities will the consumer actually buy? What will be his resulting utility?
What makes stuxnet different from other cyberwarfare attacks : What solutions for have been proposed for this problem? Do you think they will be effective? Why or why not?
Why data quality audits and data cleansing are essential : Why are information policy, data administration, and data quality assurance essential for managing the firm's data resources?
Economic order quantity of lamps the for distribution center : The Target Company imports brass lamps from China. Weekly demand at Target’s distribution center for lamps is normally distributed with an average of 4000 and a standard deviation of 1200. Each lamps costs $100. What is the economic order quantity of..
Describe the capabilities of online analytical processing : What are the principal tools and technologies for accessing information from databases to improve business performance and decision making?
Historically high rates of infant mortality : A policy may be put into place that increases access to fetal and maternal medicine for American Indians, due to their historically high rates of infant mortality. This is a frequently debated topic in politics. Some believe that there should be heal..

Reviews

Write a Review

Electrical Engineering Questions & Answers

  When the annual income is first recieved at eoy one

annual income from a rental property is expected to start at $1300 per year and decrease at a uniform amount of $50 each year after the first year for the 15-year expected life of the property. the investment cost is $8000 and "i" is 9% per year.

  Determine compressive stresses in portion bc of the beam

Two vertical forces are applied to a beam of the cross section shown. Determine the maximum tensile and compressive stresses in portion BC of the beam.

  1three resistors r1 r2 and r3 are connected in series and

1three resistors r1 r2 and r3 are connected in series and a supply voltage of 240 v. if r2 2r1 r3 3r1 and the total

  Find the energy in the conduction band

The electron distribution in the conduction band peaks at energies close to the conduction band edge. Using the Boltzmann approximation, find the energy in the conduction band (as a function of temperature) at which the electron density peaks

  What was the us annual production of coal

Research coal deposits in the USA and US coal mine production. Approximately, what was the US annual production of coal from mines in recent years What was the coal production of the Appalachian or Eastern province

  What is the gain db

What is the Gain dB? I thought dB=20 log (Vout/Vin) This would lead me to believe that it should be 20 log (1.99/1) = 5.98 dB...I am being told the answer is -0.44 dB. What is my problem

  Name at least four frequencies that could possibly present

Hecreates a frequency spectrum and plots it. He observes a peak inthe spectrum at 105 Hz. With just one sampling rate, however, Jared cannot be sure that this is the true or actual frequency componentin his signal - perhaps there is aliasing.

  Calculate the internal resistance of the battery at the load

A standard D cell flashlight battery is connected to a load of 3 Ω. After 6 hr of intermittent use the load voltage drops from an initial 1.5 V to a final useful voltage of 0.9 V.

  The radius of a spherical drop of water with a charge

The radius of a spherical drop of water with a charge of 3*10-6 C and potential of 500 V at its surface

  Find the energy stored in each capacitor.

Consider a group of capacitors, where C1=14 µF and C2=6.8 µF. Terminals A and B are connected to a 9.0 V battery. Find the energy stored in each capacitor.

  Find the required line widths and separation

If possible, compare your results to those obtained from a microwave CAD tool.

  How do the time-variations depend on the bandwidth

Consider the two-path example d = 2 km and the receiver at 1.5 km from the transmitter moving at velocity 60 km/h away from the transmitter. The carrier frequency is 900 MHz. Plot in MATLAB the magnitudes of the taps of the discrete-time baseb..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd