TITLE

Virus Season

AUTHOR(S)
Friedman, Norman
PUB. DATE
November 2010
SOURCE
U.S. Naval Institute Proceedings;Nov2010, Vol. 136 Issue 11, p88
SOURCE TYPE
Conference Proceeding
DOC. TYPE
Article
ABSTRACT
The article offers information on a worm called STUXNET, which is reportedly designed for cyber attack. It states that 60 percent of the computers involved in the attacks are Iranian, but they have denied that it has attacked their reactor at Bushehr or uranium-enrichment plant at Natanz, both in Iran. It mentions that it seems to have been introduced through universal serial bus (USB) thumb drive, has affected the U.S. Central Command system and keeps reappearing even after getting destroyed.
ACCESSION #
55494581

 

Related Articles

  • Shadow War. Sweetman, Bill // Defense Technology International;Jan2012, Vol. 6 Issue 1, p14 

    The article discusses how the continuous attack from cyberespionage or cybernetwork exploitation (CNE) like the Advanced Persistent Threat (APT) has forced the U.S. to delay programs and divert resources into cumbersome security precautions. It says that APT attacks break into ostensibly secure...

  • PC VIRUS ATTACKS IN SMALL FIRMS: EFFECTS OF RISK PERCEPTIONS AND INFORMATION TECHNOLOGY COMPETENCE ON PREVENTIVE BEHAVIORS. MARIANI, MARCO G.; ZAPPALÁ, SALVATORE // TPM: Testing, Psychometrics, Methodology in Applied Psychology;Mar2014, Vol. 21 Issue 1, p51 

    While Information Technology (IT) is undeniably useful in improving organizational efficiency, it is also vulnerable: a virus attack can interrupt the work of many employees. Human behaviors, practices and errors are possible causes of a computer virus attack and the consequent infections. Even...

  • the week in IT.  // Computer Weekly;10/5/2010, p3 

    The article offers news briefs related to Information Technology (IT). The computer worm, Stuxnet, which is considered to be the world's first cyber weapon, hits computers in China. Police arrests 19 people of an international computer crime gang, Zeus Trojan, that has stolen millions of pounds...

  • Stuxnet: What Has Changed? Denning, Dorothy E. // Future Internet;Sep2012, Vol. 4 Issue 3, p672 

    This paper considers the impact of Stuxnet on cyber-attacks and cyber-defense. It first reviews trends in cyber-weapons and how Stuxnet fits into these trends. Because Stuxnet targeted an industrial control system in order to wreak physical damage, the focus is on weapons that target systems of...

  • Computer Worm Classification. Pratama, Andhika; Rafrastara, Fauzi Adi // International Journal of Computer Science & Information Security;Apr2012, Vol. 10 Issue 4, p21 

    To find out more the ins and the outs of computer worm, including how the work and how to overcome, it is necessary to study the classification of computer worm itself first. This paper presents taxonomy for classifying worm structure, worm attack, worm defense, and user defense.

  • ISA99 examines standards' strength against Stuxnet-like attacks. Policastro, Ellen Fussell // InTech;Mar/Apr2011, Vol. 58 Issue 2, p49 

    The article examines the American National Standards Institute (ANSI)/International Society of Automation (ISA) 99 standards in relation to threats posed by Stuxnet. A background is provided concerning the revelation of sophisticated computer worm Stuxnet in 2010 and subsequent creation of a...

  • Worm Secure Protocol for Wormhole Protection in AODV Routing Protocol. Kumar, Vijay; Kush, Ashwani // International Journal of Computer Applications;Apr2012, Vol. 44, p15 

    A Mobile Adhoc Network (MANET) is characterized by mobile nodes, multihop wireless connectivity, Non infrastructural environment and dynamic topology. In Ad Hoc network routing is the reactive on-demand philosophy where routes are established only when required. Stable Routing, Security and...

  • To catch a thief. Marks, Paul // New Scientist;6/9/2012, Vol. 214 Issue 2868, p24 

    The article discusses the complex computer virus Flame and its potential risk for national infrastructure. Topics include how Flame temporarily disrupted the Iranian oil industry, how Flame is capable of stealing, transmitting and deleting sensitive information, and the difficulty of locating...

  • Global Cyber Security Outlook.  // Sudan Defence & Security Report;Q1 2011, Issue 1, p27 

    The article presents an outlook on global cyber security from 2010-2015. It provides political risk analysis of cyber warfare that claims to affect global political and economic stability. It mentions that cyber attacks to financial institutions would become precedence for terrorist attacks....

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics