Wednesday, 11 April 2018

CIS 560 Week 2 Case Study 1

CIS 560 Week 2 Case Study 1

 

In June 2010, Stuxnet, a complex and highly sophisticated computer worm was discovered by Kaspersky Lab. Stuxnet targeted Siemens industrial Supervisory Control and Data Acquisition (SCADA) systems. It was reported that the worm appeared to target Iran’s uranium enrichment infrastructure. Most computer worms and viruses tend to target consumer systems such as desktop computers and laptop computers.
You can learn more about Stuxnet at http://www.youtube.com/watch?v=scNkLWV7jSw.
Write a four to five (4-5) page paper in which you:
  1. Analyze the level of security requirements between industrial systems and consumer devices such as desktop computers. Address if they should be the same or different.
  2. Analyze the anatomy of Stuxnet and how it was able to damage Iran’s SCADA systems.
  3. Evaluate the lessons that were learned from Stuxnet about the vulnerability of Iran’s SCADA systems. Suggest how the attacks could have been prevented.
  4. Provide five (5) guidelines that should be used to reduce a network’s attack surface for industrial control systems.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.



















CIS 560 Week 2 Case Study 1

 

In June 2010, Stuxnet, a complex and highly sophisticated computer worm was discovered by Kaspersky Lab. Stuxnet targeted Siemens industrial Supervisory Control and Data Acquisition (SCADA) systems. It was reported that the worm appeared to target Iran’s uranium enrichment infrastructure. Most computer worms and viruses tend to target consumer systems such as desktop computers and laptop computers.
You can learn more about Stuxnet at http://www.youtube.com/watch?v=scNkLWV7jSw.
Write a four to five (4-5) page paper in which you:
  1. Analyze the level of security requirements between industrial systems and consumer devices such as desktop computers. Address if they should be the same or different.
  2. Analyze the anatomy of Stuxnet and how it was able to damage Iran’s SCADA systems.
  3. Evaluate the lessons that were learned from Stuxnet about the vulnerability of Iran’s SCADA systems. Suggest how the attacks could have been prevented.
  4. Provide five (5) guidelines that should be used to reduce a network’s attack surface for industrial control systems.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

No comments:

Post a Comment

Note: only a member of this blog may post a comment.

FIN 317 Financing an Expansion Assignment

  FIN 317 Financing an Expansion Assignment   Financing an Expansion Overview After 12 years, your business is wildly successful, with multi...