Week 5 Discussion 1

profilekinbwi

Stuxnet


Your readings this week emphasize enumeration and computer system hacking. One of the most sophisticated attacks found this decade is called Stuxnet, so it is worth reviewing this attack. 

  • Explain in your own words the processes used by the Stuxnet attackers to conceal their actions. Discuss why you believe these were successful in being undetected for such a long period of time. In your opinion, explain what precautions could have prevented Stuxnet from occurring. Describe how Stuxnet changed the dynamics of defending threats. Are there any Internet resources you could recommend that would be useful in understanding these concepts? Share with your classmates and provide links to any useful resources you find.

After reading a few of your classmate's postings, reply to the ones from which you learned something new, or to which you have something to add. Remember to get in early and post often.

Additional post option: Based on your research, who is responsible for Stuxnet?

    • 6 years ago
    • 10
    Answer(2)

    Purchase the answer to view it

    blurred-text
    NOT RATED
    • attachment
      Discussion1StuxnetandCoveringTracks.docx

    Purchase the answer to view it

    blurred-text
    NOT RATED
    • attachment
      Stuxnet.docx