Milevski, Lukas
October 2011
JFQ: Joint Force Quarterly;2011 4th Quarter, Issue 63, p64
The article focuses on Stuxnet malware attacks on the Iranian nuclear sites. Its physical effect was significant: 1,000 centrifuges were destroyed, out of a total of 9,000 at Natanz, but Iran has been estimated to have only stockpiled the material to build 12,000 to 15,000 centrifuges. Stuxnet proliferated, particularly in Iran, those working in the nuclear program will have to take extra care to prevent reinfection.


Related Articles

  • Cyberterrorism: Threat or Hype? Langnau, Leslie // Material Handling Management;May2003, Vol. 58 Issue 5, p18 

    Addresses the threat posed by cyberterrorism to businesses in the U.S. Reason for the focus on possibilities of cyberterrorism; Examples of communication and computer attacks; Statistics on virus attacks; Computer security options.

  • Why Iran Didn't Admit. Brown, Gary D. // JFQ: Joint Force Quarterly;2011 4th Quarter, Issue 63, p70 

    The article examines the possible reasons why Iran has drawn conclusion that it had been the victim of a cyber attack by virus Stuxnet. The Stuxnet code showed up on computer systems around the world, where it parked on hard drives, remaining inert if it did not find what it was seeking. It is...

  • Sobigf--another virus nuisance. Sardoni, Ken // Enterprise/Salt Lake City;9/01/2003, Vol. 33 Issue 10, p13 

    Examines the proliferation of computer viruses. Problems caused by a virus attack; Signs of an attack; Recommendations in avoiding or mitigating the effects of viruses.

  • Arming Yourself in the Virus War. Goldsborough, Reid // Black Issues in Higher Education;10/23/2003, Vol. 20 Issue 18, p44 

    Discusses the prevalence of computer virus attacks. Threats posed by the viruses; Precautions against the attacks; Action taken by the U.S. government to address the problem; Ways to obtain virus protection.

  • Corporate Cyber Attacks on the Rise.  // Information Management Journal;Jul/Aug2005, Vol. 39 Issue 4, p20 

    This article addresses the growth of computer crimes and threat among business enterprises in the U.S. A recent study by security software provider Symantec found the number of phishing attacks -- when individuals try to fraudulently obtain passwords and sensitive personal information through...

  • TERROR ON THE INTERNET. Emigh, Jacqueline // Government Security;Oct2004, Vol. 3 Issue 6, p38 

    Focuses on cyberterrorism or the presence of terrorist groups on the Internet. Increase in number of Web sites set up by terrorist groups; Differences in expert opinions about how terrorist might use the Internet; Purposes served by terrorists' presence on the Internet; Reasons why it is...

  • An Overview Of Virus Activity In 2003.  // Software World;Jan2004, Vol. 35 Issue 1, p22 

    Presents an overview of computer virus activity in 2003. Cases of major virus outbreaks; Details on the origin of the viruses; Information on the security measures taken to counter threats of virus activity.

  • Intended Consequences: Regulating Cyber Attacks. McGavran, Wolfgang // Tulane Journal of Technology & Intellectual Property;Sep2009, Vol. 12, p259 

    In this article, the author discusses the types of cyber attacks and examines profile instances of cyber attacks, particularly in Estonia and Georgia. The author explores the initiatives of these countries in order to deal with cyber deals and applies standards of international law to cyber...

  • Organic smoked sausages with a side a Blaster? Schifreen, Robert // SC Magazine: For IT Security Professionals (UK Edition);Jun2004, p10 

    This article presents the author's opinion on computer viruses. As anyone who knows me will testify, there are very few events that will pry me away from a good meal. I had arrived home from work and settled down to eat. Organic smoked sausages and mashed potatoes mixed with pan-fried leeks...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics