CSCC Cyber Ssecurity Stuxnet Dissecting a Cyberwarfare Weapon Analysis
Description
1a. Read the Support Documentation:
- Stuxnet: Dissecting a Cyberwarfare Weapon stuxnet-dissect.pdf stuxnet-dissect.pdf – Alternative Formats
- To Kill a Centrifuge – A Technical Analysis of What Stuxnet’s Creators Tried to Achieve to-kill-a-centrifuge.pdf to-kill-a-centrifuge.pdf – Alternative Formats
- The Real Story of Stuxnet stuxnet-ieee-spectrum.pdf stuxnet-ieee-spectrum.pdf – Alternative Formats
Ralph Langner: Cracking Stuxnet, a 21st-century cyber weapon
Duration: 10:41
User: n/a – Added: 3/29/11
1b. Read Prevention – Mitigation Methods:
- Security Tip (ST18-004) Protecting Against Malicious Code
- ICS Advisory (ICSA-10-238-01B) Stuxnet Malware Mitigation (Update B)
2. Complete an analysis of the Stuxnet attacks and describe the method/s involved.
- Read/Research and cite at least TWO intelligence sources. (Use APA formatting for the citations)
- Describe the intent of the campaign Identify the methods used by the attacker that made the attack effective.
- Develop an opinion on why the attack was successful and share how this has and will future attacks.
- Identify at least THREE mitigation techniques that could be implemented to prevent the attack.
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."