STUXNET A Worm With A Purpose.

Slides:



Advertisements
Similar presentations
By Hiranmayi Pai Neeraj Jain
Advertisements

Stuxnet Richard Renner. James Bond virus Facts Earliest copy recovered from June KB in size First public knowledge July % of infected.
Week 7 Oct Virus in the news charges-firms-with-tech-support-scams phphttp://
CONTROL SYSTEMS AND CYBER SECURITY 2600 MEETING JUNE 6,2014 MICHAEL TOECKER Mikhail Turcher, big fanci pantsie.
Cyber-Warfare Analyzed by: Josh Burleson Brian Epp Chrissy Miller Martin Vanis “Cyber attacks…is not in any way comparable to weapons of mass destruction.
Variety of images of Jesus. A Question still asked.
Protecting our Cyber Space Staying Ahead of the Game Basel Alomair National Center for Cybersecurity Technology (C4C) King Abdulaziz City for Science and.
Stuxnet Malware Attribution Mike Albright CS 591 Fall 2010.
Novel Information Attacks From “Carpet Bombings” to “Smart Bombs”
by the way we 1.Introduction: Cultural Norms and Values - Stereotyping American culture Chinese culture.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Cyber-Warfare: The Future is Now!
Trust, Safety, & Reliability Part 2 MALICE. Malware Malware: short for “malicious software” Hackers: people who write and deploy malware Worm: program.
STUXNET. Summary What is Stuxnet? Industial Control Systems The target/s of Stuxnet. How Stuxnet spreads. The impact of Stuxnet on PLC’s.
 Discovered in June/July 2010  Targeted Siemens software and equipment running Microsoft Windows  First malware for SCADA systems to spy and subvert.
Instilling rigor and imagination in analysis Countering the Iranian Nuclear Threat Stuxnet and its Broader Implications Randolph H. Pherson Mary C. Boardman.
A sophisticated Malware Arpit Singh CPSC 420
Israel Zionism; Israeli liberation movement. A return to the homeland. "Persecution: a program or campaign to exterminate, drive away, or subjugate a people.
Creation of ancient state of Israel -- The Jewish people believe that the land (Israel) was given to them by God. Moses led the Jews to this land during.
Jonathan Baulch  A worm that spreads via USB drives  Exploits a previously unknown vulnerability in Windows  Trojan backdoor that looks for a specific.
By Ksenia Primizenkina 8K
Cyber-Attack On Department Of Defense. Overview Washington has reported that there has been a widespread attack on Defense Department computers that may.
Timelines And Nuclear Deals With Iran Jon Wolfsthal Deputy Director CNS US Institute for Peace – June 10, 2014.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
MALWARE : STUXNET CPSC 420 : COMPUTER SECURITY PRINCIPLES Somya Verma Sharad Sharma Somya Verma Sharad Sharma.
Lessons from Stuxnet Matthew McNeill. Quick Overview Discovered in July 2011 Sophisticated worm - many zero-day exploits, Siemens programmable logic controller.
VirusesViruses HackingHacking Back upsBack ups Stuxnet Stuxnet.
Quick Background. Palestine After WWII After World War II, new independent states emerged in the Middle East. The states were mostly Muslim. Between the.
Software Reliability in Nuclear Systems Arsen Papisyan Anthony Gwyn.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
Today’s Schedule – 4/24/13 Lecture: Origins of Middle East conflict -Palestine and Israel -Suez Canal Crisis HW: -Continue reading ME FP.
Today’s Schedule – 4/22/14 Domestic Agenda Quiz Discuss Final Paper Lecture: Origins of Middle East conflict -Palestine and Israel -Suez Canal Crisis HW:
Flame: Modern Warfare Matthew Stratton. What is Flame? How it was found What are its capabilities How it is similar to Stuxnet and Duqu Implications.
Israel and Palestine. The heart of the conflict is in Israel in the area around the West Bank, the Gaza Strip, and East Jerusalem. The Jewish people originally.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Creation of ancient state of Israel -- The Jewish people believe that the land (Israel) was given to them by God. Moses led the Jews to this land during.
History The worm was at first identified by the security company VirusBlokAda in mid-June Journalist Brian Krebs's blog posting on 15 July 2010.
Travis Deyarmin. In This Presentation  What is Stuxnet  What is Flame  Compare/Contrast  Who is Responsible  Possible Repercussions.
How a presumably military grade malware sabotaged the Iranian nuclear program W32.Stuxnet Presenter: Dolev Farhi |
By: Marielle Jones Period 6 Why business education? Business education helps students know the necessities of saving and investing.
International Conflict & Cyber Security
W32.Stuxnet How a presumably military grade malware sabotaged the Iranian nuclear program Presenter: Dolev Farhi |
How Secure Is Our Power Grid?
Harlem’s Rattlers: Fight for Equality
Stuxnet By Shane Serafin.
THE BIGGEST PROBLEM OF THE WORLD: THE OCCUPIED ARAB LANDS
Cybersecurity Case Study STUXNET worm
Hispanic Heritage Month Presentation
White Hat vs. Black Hat White Hat Black Hat
Report Writing.
Modern World History World History (RVCS).
“The Great Bitterness”
Cold War
Backing Up Files File Maintenance Unit.
Propagation, behavior, and countermeasures
Warm UP # 44 What is the conflict that exists between Israel and Palestine, why is it happening?
Object Oriented Programming and Software Engineering CIS016-2
The United Kingdom of Great Britain & Northern Ireland
THE BIGGEST PROBLEM OF THE WORLD: THE OCCUPIED ARAB LANDS
THE BIGGEST PROBLEM OF THE WORLD. THE OCCUPIED ARAB LAND?
End Four Minutes First Four Chart Date & label your work
A nation of people who wish to be their own state.
Arab-Israeli conflict
It is 1950 the sound you hear is an air raid warning of a possible nuclear attack. Immediately get under your desk and cover yourself with your arms protecting.
Questions and Written Response Gaza Strip, West Bank, and Hezbollah
Who was the most important Tudor Monarch?
Chronology. A four year war?
Who was the most important Tudor Monarch?
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
16-1.   In WW1 the Ottoman Empire sided with Germany, and lost European Nations Take Over.
Presentation transcript:

STUXNET A Worm With A Purpose

Introduction Brief History Overview of Stuxnet The Origin of the Worm How it Works Level of Sophistication Effects of the Worm Conclusion References

Brief History Israeli-Arab Conflict A Nuclear Iran US Relations

Overview of Stuxnet Discovery Intention Victims

The Origin of the Worm Multiple Nations Suspected Nations Involved: Israel U.S. Great Britain Germany

How it Works Infection and Spreading Flash Drives Seimens PLC’s

Level of Sophistication The Most Sophisticated Malware Ever? Movie-Like Characteristics (Bank Heist) First of its Kind

Effects of the Worm Iran’s Nuclear Power Plant 5 Major Iranian Manufacturers Full Extent of Damage Still Unknown Stolen and Released on the Internet

Conclusion Where Did it Come From? Why Was it Made? How Does it Work? What Were its Effects? Where is Cyberwar Headed?

References New York Times: BBC News: Wikipedia: http://www.nytimes.com/2011/01/16/world/middleeast/16stuxnet.html BBC News: http://www.bbc.co.uk/news/technology-12465688 Wikipedia: http://en.wikipedia.org/wiki/Arab%E2%80%93Israeli_conflict