Verified Document

Stuxnet Threat Cyber Security Appears Research Paper

This however does not eliminate the risk of emergency shut downs or corruptibility, but it does present a new, although regressive approach to solving this problem. Legislation and laws may help bring light to the problem but cyber attacks move to quickly to fall victim to those measures. The speed and quick pace at which opportunities present themselves in cyberspace ensures that laws will soon be outdated as technology and computing ability continues to evolve and grow beyond our ability to manage it.

Public policy and decision makers do not seem to have the tools or know how as to fix this problem and guarantee safety. It is up to individuals at all levels of government, business and community to take it upon themselves to provide backup measures in case...

Parts of this document are hidden

View Full Document
svg-one

While eliminating the dependence on these types of systems will eventually solve this problem in the long-term, it may take many decades until civilization has become organized where energy grids and communication systems are not needed to live an enjoyable and prosperous life.
References

Falco, J., Scarfone, K., & Stouffer, K. (June 2011). Guide to industrial control systems (ICS) security. Recommendations of the National Institute of Standards and Technology. Special Publication, 800-82.

Marks, P. (2011). The Stuxnet worm is like nothing seen before. New Scientist, 18 Jan 2011. Retrieved from http://www.newscientist.com/article/dn19504-why-the-stuxnet-worm-is- like-nothing-seen-before.html

Sources used in this document:
References

Falco, J., Scarfone, K., & Stouffer, K. (June 2011). Guide to industrial control systems (ICS) security. Recommendations of the National Institute of Standards and Technology. Special Publication, 800-82.

Marks, P. (2011). The Stuxnet worm is like nothing seen before. New Scientist, 18 Jan 2011. Retrieved from http://www.newscientist.com/article/dn19504-why-the-stuxnet-worm-is- like-nothing-seen-before.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Maritime Safety and Security SOP for Homeland Security Perspectives...
Words: 1341 Length: 4 Document Type: literature review

Introduction The maritime industry is increasingly moving towards the adoption of systems that rely heavily on digitization, automation, and integration (Hayes, 2016). The extensive use of advanced technological solutions in the maritime industry is driven by the urgent need to maintain the industry in sync with all other industries that seem to have a step forward in adopting technological solutions. As a result of this growth and development in technological solutions,

Crime Workplace Is Not Safe From Numerous
Words: 3278 Length: 11 Document Type: Essay

Crime Workplace is not safe from numerous types of crimes. These crimes can range anywhere from burglary to homicides and from discrimination on the basis of sex to even rape for that matter. But these crimes are physical crimes and it is easy to avoid them or keep them at bay by making use of physical barriers, security cameras and a few sensible risk/security management tactics. For instance, if only

Cyber Warfare
Words: 2636 Length: 10 Document Type: Term Paper

Cyber warfare continues to grow larger than imagination as the public becomes more aware of and involved in technology. This work in writing will identify a case study that presents a 'cell', 'klan', or 'state', which conducted or has the capacity to conduct cyber warfare. This work will describe the elements of: who, what, where, and why and means of conducting such cyber warfare and the organizational ideology behind the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now