Monday, April 29, 2019

Cybersecurity Incident Research Paper Example | Topics and Well Written Essays - 1500 words

Cybersecurity Incident - Research Paper ExampleTherefore, ensuring that all the stored data is make prisoner and not accessible to e trulyone has become a prerequisite to almost everyone using the cyber systems to protect their data. The kinds of security incidents roll out from being minor invasion of a small virus into the computer networks to the major threat on the secrecy of the data available on the networks because of a much powerful and destructive virus assail the softwares. In all these cases, strict check and reporting of the cyber incidents are mandatory (Shaw, 2006, p 461). One of much(prenominal) cyber security threats that claim come up in the recent years includes the Stuxnet Virus. The Stuxnet Virus (Natarajan et al, 2011) was detected in the mid of 2010, this was a Windows computer worm that attacked industrial softwares and equipments. ready reckoner worm is a computer chopine that produces various copies of itself, and through the help of the targeted compu ter network, it attacks other computers too in the same network (Natarajan et al, 2011). Computer worms can attack a number of computer softwares in the same network without any associate of user intermediation due to poor security systems of the targeted computers (Gingrich, 2011, pp 333). ... Moreover, Stuxnet was also the firstborn computer breach to have a programmable logic controller (PLC) software root kit (Shaw, 2006) functioning with itself. The Stuxnet worm at first randomly attacks any software but then its specially designed pestware payload aids in aiming at only Siemens and Supervisory Control and information Acquisition (SCADA) softwares (Shaw, 2006). Supervisory Control and Data Acquisition (SCADA) (Shaw, 2006) makes reference to industrial control systems that are computer systems, which look after plus bewilder crucial industrial, infrastructural, or facility-based actions. Stuxnet corrupts programmable logic controller softwares by destroying the Step-7 softwa re application (Shaw, 2006) operated to make schemes of the devices in operation. This hinders the softwares from work properly and affects the aimed softwares greatly. In contrast to most of the malware softwares, Stuxnet (Shaw, 2006) does not do much damage to the computers and networks that do not need the downright requirements of the targeted softwares that are set. Instead, it is technically designed software only attacks the networks and computers that stand up to the requirements configured into them. Although the Stuxnet worm attacks and destroys computers and networks without fail, it automatically makes itself inactive if the Siemens softwares are not detected on the invaded computers, this makes the attacking of the softwares very precise and only the sought after networks and computers and affected. Stuxnet worms (Shaw, 2006) can be apocalyptical for the infected computers Stuxnet embodies self-protection shields deep down itself that curbs the attacked computers fro m transmitting the virus to more than three computers, moreover, it also weakens the security systems in

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.