Verified Document

Stuxnet Threat Cyber Security Appears Research Paper

This however does not eliminate the risk of emergency shut downs or corruptibility, but it does present a new, although regressive approach to solving this problem. Legislation and laws may help bring light to the problem but cyber attacks move to quickly to fall victim to those measures. The speed and quick pace at which opportunities present themselves in cyberspace ensures that laws will soon be outdated as technology and computing ability continues to evolve and grow beyond our ability to manage it.

Public policy and decision makers do not seem to have the tools or know how as to fix this problem and guarantee safety. It is up to individuals at all levels of government, business and community to take it upon themselves to provide backup measures in case...

While eliminating the dependence on these types of systems will eventually solve this problem in the long-term, it may take many decades until civilization has become organized where energy grids and communication systems are not needed to live an enjoyable and prosperous life.
References

Falco, J., Scarfone, K., & Stouffer, K. (June 2011). Guide to industrial control systems (ICS) security. Recommendations of the National Institute of Standards and Technology. Special Publication, 800-82.

Marks, P. (2011). The Stuxnet worm is like nothing seen before. New Scientist, 18 Jan 2011. Retrieved from http://www.newscientist.com/article/dn19504-why-the-stuxnet-worm-is- like-nothing-seen-before.html

Sources used in this document:
References

Falco, J., Scarfone, K., & Stouffer, K. (June 2011). Guide to industrial control systems (ICS) security. Recommendations of the National Institute of Standards and Technology. Special Publication, 800-82.

Marks, P. (2011). The Stuxnet worm is like nothing seen before. New Scientist, 18 Jan 2011. Retrieved from http://www.newscientist.com/article/dn19504-why-the-stuxnet-worm-is- like-nothing-seen-before.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Cyber Warfare
Words: 2636 Length: 10 Document Type: Term Paper

Cyber warfare continues to grow larger than imagination as the public becomes more aware of and involved in technology. This work in writing will identify a case study that presents a 'cell', 'klan', or 'state', which conducted or has the capacity to conduct cyber warfare. This work will describe the elements of: who, what, where, and why and means of conducting such cyber warfare and the organizational ideology behind the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now