logo

Consequences of Iranian Stuxnet Computer Worm on Identity, Access Control, Network Security and Crypto

   

Added on  2023-06-03

16 Pages3378 Words427 Views
Enterprise Security 1
Student’s Name
University
Enterprise security
Date

Enterprise Security 2
1.0 Executive Summary
The main purpose of this paper is to report the consequences of Iranian Stuxnet computer
worm on identity, Access control, network security and crypto. The paper will also provide
the qualitative risk analysis of the worm, suitable framework that can be used to prevent the
attack and the application on the UN charter Article 2(4), UN Charter Article 51 and what
the Tallian Manual provides.

Enterprise Security 3
Table of Contents
2.0 Glossary................................................................................................................................4
3.0 Introduction..........................................................................................................................5
4.0 What Stuxnet does................................................................................................................5
5.0 Stuxnet qualitative analysis..................................................................................................6
5.0 Applying a Formal Enterprise Architecture framework in preventing a Stuxnet attack......8
6.0 How International laws require a state to act after a Stuxnet cyber-attack or any other....10
7.0 Conclusion..........................................................................................................................12

Enterprise Security 4
2.0 Glossary
PLCs- Programmable Logic Controllers
MBI- Machine for Business International
SCADA- Supervisory Control and Data Acquisition
C&C server- Command and Control server
DOS- Denial of Service

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Enterprise Security Assignment
|15
|3928
|195

ITNET202A Enterprise Security Assignment 1
|15
|3597
|151

Stuxnet: A Qualitative Risk Analysis and Enterprise Security Architecture
|15
|2730
|224