preview

Assessment of the Scada, Stuxnet Worm on US and Global Infrastructures

Better Essays

Assessment of the SCADA/Stuxnet Worm on U.S. and Global Infrastructures
The rapid proliferation of malware and sophisticated computer viruses capable of electronically interrupting and dismantling nuclear sites, key elements of infrastructure to the Programmable Logic Controller device level while "learning" or accumulating knowledge at the same time is becoming more pervasive. The well-known Stuxnet worm, which experts theorize was originally funded and supported technologically by one or more nations to attack Iran's Bushehr reactor (Greengard, 2010) is one of the most strategically lethal cyberweapons in existence today. What makes the Stuxnet worm so lethal is its ability to traverse and navigate Supervisory Control and Data Acquisition (SCADA) networks, targeting specific devices and programmable controllers down to the manufacturer and operational block level (Network Security, 2010). The Stuxnet worm is widely believed to be designed to quickly navigate the Microsoft-based platform of the Iranian Bushehr reactor and disable it from operating, as this nation is widely believed to be using the reactor to produce uranium for their weapons program (Network Security, 2010). The stealth-like nature and speed of the Stuxnet worm has also been problematic to catch even in controlled SCADA-based infrastructure systems. The level of sophistication of this threat is at a level not seen before by many organizations and national security agencies (Greengard, 2010). The intent of

Get Access