StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Increasing Accounts of the Cases of Attacks on the Cyber Security - Research Paper Example

Cite this document
Summary
The paper "The Increasing Accounts of the Cases of Attacks on the Cyber Security" discusses that while attacking various software, the computer worms can function without attaching themselves to the existing programs, not like computer viruses. Computer worms can be such huge threats to cybersecurity…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
The Increasing Accounts of the Cases of Attacks on the Cyber Security
Read Text Preview

Extract of sample "The Increasing Accounts of the Cases of Attacks on the Cyber Security"

?Running head: Cyber Security Incident . Cyber Security Incident s Cyber Security Incident The increasing accountsof the cases of attacks on the Cyber Security of the world and into the Cyber Networks of various organizations as well as nations, has led to the development of stricter and technologically improved Cyber Security softwares (Natarajan et al, 2011). A number of attempts initiated in the past few years to improve the Cyber Security Standards owing to the increasing attempts to invade various cyber networks. In this age of technological boom, most of the important and secretive data is stored on the computers. Therefore, ensuring that all the stored data is secure and not accessible to everyone has become a prerequisite to almost everyone using the cyber systems to protect their data. The kinds of security incidents range from being minor invasion of a small virus into the computer networks to the major threat on the secrecy of the data available on the networks because of a much powerful and destructive virus attacking the softwares. In all these cases, strict check and reporting of the cyber incidents are mandatory (Shaw, 2006, p 461). One of such cyber security threats that have come up in the recent years includes the Stuxnet Virus. The Stuxnet Virus (Natarajan et al, 2011) was detected in the mid of 2010, this was a Windows computer worm that attacked industrial softwares and equipments. Computer worm is a computer program that produces various copies of itself, and through the help of the targeted computer network, it attacks other computers too in the same network (Natarajan et al, 2011). Computer worms can attack a number of computer softwares in the same network without any sort of user intermediation due to poor security systems of the targeted computers (Gingrich, 2011, pp 333). While attacking various softwares, the computer worms can function without attaching themselves to the existing programs, not like computer viruses. Computer worms can be such huge threats to the cyber security that they always cause more or less damage to the attacked networks. Stuxnet was the first ever pestware that keeps under surveillance and destroys the targeted industrial systems (Gingrich, 2011, pp 333). Moreover, Stuxnet was also the first computer breach to have a programmable logic controller (PLC) software root kit (Shaw, 2006) functioning with itself. The Stuxnet worm at first randomly attacks any software but then its specially designed pestware payload aids in aiming at only Siemens and Supervisory Control and Data Acquisition (SCADA) softwares (Shaw, 2006). ‘Supervisory Control and Data Acquisition (SCADA)’ (Shaw, 2006) makes reference to industrial control systems that are computer systems, which look after plus regulate crucial industrial, infrastructural, or facility-based actions. Stuxnet corrupts programmable logic controller softwares by destroying the Step-7 software application (Shaw, 2006) operated to make schemes of the devices in operation. This hinders the softwares from working properly and affects the aimed softwares greatly. In contrast to most of the malware softwares, Stuxnet (Shaw, 2006) does not do much damage to the computers and networks that do not need the downright requirements of the targeted softwares that are set. Instead, it is technically designed software only attacks the networks and computers that stand up to the requirements configured into them. Although the Stuxnet worm attacks and destroys computers and networks without fail, it automatically makes itself inactive if the Siemens softwares are not detected on the invaded computers, this makes the attacking of the softwares very precise and only the sought after networks and computers and affected. Stuxnet worms (Shaw, 2006) can be apocalyptical for the infected computers; Stuxnet embodies self-protection shields within itself that curbs the attacked computers from transmitting the virus to more than three computers, moreover, it also weakens the security systems in the computers and the networks and avoids them from killing the worm that has attacked the system. In addition, Stuxnet contains cryptographs for man-in-the-middle attacks (Shaw, 2006). This secretly eavesdrops at the messages transmitted between the infected computers and spies on them without their knowledge. Moreover, because of this, the worm transmits false industrial processing signals and messages so that the attacked system does not stop working due to atypical functioning. The Stuxnet worm is a complexed virus that attacks mainly three systems in different and specialized ways. The systems that Stuxnet mainly infects includes: “The Windows operating system, Step 7 industrial software application, and Siemens programmable logic controller” (Shaw, 2006). While attacking Windows systems, the transition of the Stuxnet worm is through removable dives like; USB drives, CDs etc. The Stuxnet worm then with the help of other ways of infecting the computers, like peer-to-peer remote procedure call spies on the computer networks and exploits their integrality and privacy (Natarajan et al, 2011). The Stuxnet worm for the windows is unlike typical pestwares, it is comparatively bigger with the size of half megabyte, and coded in dissimilar programming languages. The Windows counterpart of the Stuxnet worm is calamitous for the affected networks as it transmits very fast and at every possible direction, which makes it extremely difficult for computers and networks to escape its claws. While attacking the step 7 softwares, the German researcher, “Langner, Ralph analyzed that the Stuxnet worm targets and attacks files in the format of Simen’s control softwares” (Gingrich, 2011). After attacking these softwares, the worm spies over the communique within the network that is taking place between the WinCC softwares and Siemens PLC through the removable devices installed like data cables. The pestware now installs itself on the program logic controller device secretly, and exploits the systems privacy while spying over the networks. The Program Logic Controller softwares attacked by the Stuxnet pestwares are too in distinguished ways. The Stuxnet first downloads the worm into the memory of the targeted program logic controller softwares and spies over the communications taking place between the computers of the same network (Natarajan et al, 2011). Later, it changes its frequency levels, which hinders the operation of the connected computers. Moreover, it also downloads a rootkit, which is software that enables softwares to spy over other computers and networks. Through this, the Stuxnet worm keeps itself from the getting into the eyes of the security softwares. The history of the Stuxnet does not date back to very long; the virus was itself detected in 2010. The virus had reportedly started spreading between March and April of 2010; however, it had initiated in 2009 (Natarajan et al, 2011). In March 2010, the Stuxnet worm came in the public eye, and recognized as a destructive, apocalyptical pestware. Nevertheless, the initiators believed that it was not transmitting fast enough; therefore, another time they spread the worm in April 2010, after a few basic improvements (Gingrich, 2011). On November 25, 2010, in the United States of America, the Sky News announced that it received reports that the black markets of USA, trades the Stuxnet worm. VirusBlokAda was the first security company to report the functioning of the virus in June of 2010 (Gingrich, 2011). Brian Kreb, a journalist also posted a blog on the topic, which acclaims to be the most widely read and the most popular blog ever written on the pestware. Moreover, the Stuxnet virus accused of targeting five Iranian networks, which are responsible of taking care of the uranium reserves in the country. Symantec, the biggest company providing security softwares for computers, reported on August 2010 that “almost 60% of the targeted computers by the Stuxnet worm were in Iran” (Carvey, 2011). On November 29, Siemens said that the worm only attacked and infected those Iran programs that used prohibited Siemens products confidentially got damaged by the Stuxnet worm, their clients were not affected (Carvey, 2011). However, the Kaspersky Labs objected to the statement and said that the nation would have supported the mission, instead of carrying it out secretively, the suspect Israeli influence in the case. With such threats over the privacy and security of important and curial data over the web and the computer networks, the prevention of such cyber security incidents is a major concern raised from everywhere. Stuxnet, in the recent time as been seen as a major threat over the confidentiality and secrecy of various businesses organizations, as well as nations in both the public as well as the private sectors of the industries (Natarajan et al, 2011, p 16). Even, the United States Department of Homeland Security (US-DHS) (Carvey, 2011) is concerned with the perils that such pestwares. The National Cyber Security Division operating under the name of the US-DHS (Gingrich, 2011), takes control of Control System Security Program. This program works against the operation of any such threats in the USA. The Computer Emergency Response Team (Gingrich, 2011) ran under the observation of the Control System Security Program (Gingrich, 2011), undertakes a half yearly conference which provides training to the computer engineers and cyber security team officials regarding taking care and preventing such worms from invading their systems. Moreover, they also publish the advocated practices and present the security officials with self-assessment tool to know at which level of understanding they stand. In 2008, along with the help of the Idaho National Laboratory, US-DHS (Gingrich, 2011) tried to improve the security systems of computers in the lands of America, with Siemens and tried to identify all major security loopholes that prevailed in the company’s Process Control System 7 (Natarajan et al, 2011), which was widely acclaimed software. In the Chicago conference of 2008 (Gingrich, 2011), Siemens along with Idaho National Laboratory stated the shortcomings in their control systems. Not long after this, the Stuxnet worked against these flaws too and attacked once again in 2009. In response to the damages that the Stuxnet worm has caused in its short history, many industrial companies and organizations as well as professional companies presented a number of standards and guidelines for controlling systems and making them strong enough to fight any such cyber security threats from outside. The Control System Security management program (Gingrich, 2011) is a major advancement in the same lines. Various organizations and companies under the guidance of the professional technical companies taught how to create the Control System Security management program under adjuration of big security companies. The major principle that unites all the cyber security interventions is the fact that the prevention of outside interventions at all cases depends upon a very complex approach, which is often known as “defense-in-depth” approach. This requires a number of guidelines, procedures, trainings, and grooming classes that help the cyber security controllers to respond appropriately and creating the best back up plans for their systems and computers (Carvey, 2011, p 42). While functioning a system and making use of the latest information technology, it is essential that all the data and information stored retains its confidentiality. Worms like Stuxnet can create distressing and grave impacts on the Cyber Security issues. It is therefore essential to apt and prompt measure against such pestwares, which can badly devastate the security of the affected systems. References Carvey, H. (2011). Windows Registry Forensics. Elsevier. Gingrich, N. (2011). To Save America: Stopping Obama’s Secular-Socialist Machine. Regnery Publications. Natarajan, R, et al. (2011). Distributed Computing and Internet Technology. Springer. Shaw, W. (2006). Cyber security for SCADA Systems. Penn Well Books. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cybersecurity Incident Research Paper Example | Topics and Well Written Essays - 1500 words”, n.d.)
Retrieved from https://studentshare.org/family-consumer-science/1409655-cybersecurity-incident
(Cybersecurity Incident Research Paper Example | Topics and Well Written Essays - 1500 Words)
https://studentshare.org/family-consumer-science/1409655-cybersecurity-incident.
“Cybersecurity Incident Research Paper Example | Topics and Well Written Essays - 1500 Words”, n.d. https://studentshare.org/family-consumer-science/1409655-cybersecurity-incident.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Increasing Accounts of the Cases of Attacks on the Cyber Security

Cases of cyber attacks

It also came up with a cyber security Strategy in 2008 that would provide as framework for improving its defense against cyber attacks.... Indeed, Georgia learned a valuable lesson like Estonia which prompted its government to focus on cyber security measures.... The case of the cyber attack in Estonia.... the cyber attack is considered a DDoS or Distributed Denial Of Service.... u, the cyber attack included: 1....
4 Pages (1000 words) Case Study

Forensic Computing

Forensic computing is also termed as digital forensics and cyber forensics.... This paper "Forensic Computing" focuses on the fact that the end of the 20th century saw a massive advancement in the field of forensics pertaining to electronic use.... Over the last decade, the use of electronic means for committing a felony has increased by large proportions....
8 Pages (2000 words) Case Study

The Convergence of Terrorism and Cyberspace

hellip; The emergence and widespread use of the Internet globally has made this medium vulnerable to various threats and acts of violations of both personal and organizational privacy and security.... cyber Terrorism Case Study Date cyber Terrorism Case Study Introduction With the continuing fast pace of technological development that have spanned during the current century, one is intrigued by the way criminal activities have used technological media to perpetuated havoc....
4 Pages (1000 words) Case Study

Methodologies to Minimize the Chances of Database Breach Recurrence

A health record of students, employees and parents together with their names, social security numbers and credit card numbers are among the sensitive information that subject these institutions to potential threats and makes them a valuable target to the hackers.... (Gahm, 2010)According to Gahm, Higher educational institutions should learn to take actions besides implementing proactive security to their database infrastructure in order to protect the critical information contained in their database systems....
8 Pages (2000 words) Case Study

Zynga Inc Strategic Plan

This is key as the company has realized the increasing use of mobile platforms for online gaming and access channels across the globe.... Zynga Inc.... is among the world's leading providers of online games in the United States and the rest of the world entertaining a large number of online social games....
14 Pages (3500 words) Case Study

Job Seeker Information Compromised

This paper ''Job Seeker Information Compromised'' tells that In August 2007, there was a major security alert at the online job website Monster.... As this hacking case proves, however, the security aspect of the site has left a lot to be desired.... However, nothing in internet security is foolproof as will be seen in this report.... he fraud in operation was typical, identity theft, as opposed to a lapse of security on the Monster....
9 Pages (2250 words) Case Study

Credit Card Frauds: Shell Chip and Pin

The customers of Shell reported rapid unauthorized withdrawals from their accounts.... It was found that the card information of the customers, along with the four-digit PIN (Personal Identification Number) was copied in the reader and this was used to make withdrawals from their accounts.... Shell reported that a total of ' 1 million has been missing from its customers' accounts and the investigation on the system was conducted immediately to identify the vulnerabilities....
16 Pages (4000 words) Case Study

Professional skill

(1) The data was used for the new application without the consent of the data subjects for which the company was responsible along with the contractor.... The UK Data protection Act 1998, Chapter 9, Part I, (a) and (b), The Data Protection Act 1998, Chapter 9, Part II, Section 4, (a) and (b), the First Principle and the Second principle of the Act were breached....
4 Pages (1000 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us