Stuxnet Threat Cyber Security Appears Research Paper

PAGES
2
WORDS
483
Cite

This however does not eliminate the risk of emergency shut downs or corruptibility, but it does present a new, although regressive approach to solving this problem. Legislation and laws may help bring light to the problem but cyber attacks move to quickly to fall victim to those measures. The speed and quick pace at which opportunities present themselves in cyberspace ensures that laws will soon be outdated as technology and computing ability continues to evolve and grow beyond our ability to manage it.

Public policy and decision makers do not seem to have the tools or know how as to fix this problem and guarantee safety. It is up to individuals at all levels of government, business and community to take it upon themselves to provide backup measures in case...

...

While eliminating the dependence on these types of systems will eventually solve this problem in the long-term, it may take many decades until civilization has become organized where energy grids and communication systems are not needed to live an enjoyable and prosperous life.

Sources Used in Documents:

References

Falco, J., Scarfone, K., & Stouffer, K. (June 2011). Guide to industrial control systems (ICS) security. Recommendations of the National Institute of Standards and Technology. Special Publication, 800-82.

Marks, P. (2011). The Stuxnet worm is like nothing seen before. New Scientist, 18 Jan 2011. Retrieved from http://www.newscientist.com/article/dn19504-why-the-stuxnet-worm-is- like-nothing-seen-before.html


Cite this Document:

"Stuxnet Threat Cyber Security Appears" (2013, May 09) Retrieved April 23, 2024, from
https://www.paperdue.com/essay/stuxnet-threat-cyber-security-appears-99812

"Stuxnet Threat Cyber Security Appears" 09 May 2013. Web.23 April. 2024. <
https://www.paperdue.com/essay/stuxnet-threat-cyber-security-appears-99812>

"Stuxnet Threat Cyber Security Appears", 09 May 2013, Accessed.23 April. 2024,
https://www.paperdue.com/essay/stuxnet-threat-cyber-security-appears-99812

Related Documents

Introduction The maritime industry is increasingly moving towards the adoption of systems that rely heavily on digitization, automation, and integration (Hayes, 2016). The extensive use of advanced technological solutions in the maritime industry is driven by the urgent need to maintain the industry in sync with all other industries that seem to have a step forward in adopting technological solutions. As a result of this growth and development in technological solutions,

Crime Workplace is not safe from numerous types of crimes. These crimes can range anywhere from burglary to homicides and from discrimination on the basis of sex to even rape for that matter. But these crimes are physical crimes and it is easy to avoid them or keep them at bay by making use of physical barriers, security cameras and a few sensible risk/security management tactics. For instance, if only

Cyber Warfare
PAGES 10 WORDS 2636

Cyber warfare continues to grow larger than imagination as the public becomes more aware of and involved in technology. This work in writing will identify a case study that presents a 'cell', 'klan', or 'state', which conducted or has the capacity to conduct cyber warfare. This work will describe the elements of: who, what, where, and why and means of conducting such cyber warfare and the organizational ideology behind the