preview

Tuxtaxnet Viruses

Decent Essays

Each year there are many attempts to illegal gain entry into networks by attackers to steal information. Some attacks are designed to steal information while other may be to attack a system to cause damage or disrupt services. Attack can happen from anywhere in the world due to the internet and networks. A person from China can hack into an American network or such Stuxnet virus attack on Iran nuclear power plan which thought to be from Israel or United States but it is unsure where the virus originated from. According to Merkow & Breithaupt (2006), viruses caused the greatest financial loss over other computer crimes, (p 142). Worm is a type of virus which replicates and can easily infect a machine and then spread out across the network by using transport features of the computer or network. …show more content…

military in which in 24,000 Pentagon files were stolen. The cyberattack revealed serious vulnerabilities in the U.S. cybersecurity and the content of the documents stolen may include sensitive information including aircraft avionics, surveillance technology, satellite communication systems and network security protocols. The attack was carried out by malicious coding on a flash drive which was plugged into a military laptop. According to an article by Nakashima (2010), Deputy Defense Secretary Williams J. Lynn III informed the public the malicious code was placed on a drive by foreign intelligence agency and it uploaded the files on a network ran by the U.S. Central Command, (Nakashima, 2010). There are many methods that can be used to try to steal information by placing malicious code on websites, emails, storage drives, etc. With these different methods, malicious coding can be easily placed on a system to steal information. The jump drive was the start of malicious code which infected a laptop and then grew from

Get Access