Stuxnet: The Changing Face of Cyberwarfare

Stuxnet 
the Changing Face of
Cyberwarfare
Introduction
A malicious computer worm
First uncovered in 2010 by 
 Co.
VirusBlokAda
Stuxnet
500KB
 several programming language
Four zero-day flaws
Threat
The first visible example of industrial cyberwarfare
Targeting industrial control systems
Infected over 200,000 computers and caused 1,000
machines to physically degrade
The most sophisticated cyberweapon
Target
SCADA 
(Supervisory Control And Data Acquisition)
PLCs (
Programmable Logic Controller
)
It is typically introduced to the target environment via an
infected USB flash drive.
Affected countries
Neither country
has admitted responsibility
The worm is frequently described as
a jointly built American/Israeli cyberweapon.
Problems
Worry for security experts and government officials is an act
of cyberwarfare against a critical resource
Electric grid
Financial systems
Communications systems
Q&A
有聽過什麼樣的惡意程式嗎?又是如何造成威脅?
Q&A
除了透過
USB
散佈惡意程式外,還有什麼途徑容易中毒?
Slide Note

https://www.youtube.com/watch?v=7g0pi4J8auQ

https://www.csoonline.com/article/3218104/malware/what-is-stuxnet-who-created-it-and-how-does-it-work.html

資安問題 電腦 公司系統 國家系統

透過網路攻擊造成世界恐慌的案例

Embed
Share

A deep dive into the Stuxnet cyberweapon, a malicious computer worm targeting industrial control systems with its sophisticated capabilities, affecting multiple countries and posing significant threats to critical resources. Despite being linked to American and Israeli origins, neither country has admitted responsibility for its creation, raising concerns among security experts and government officials worldwide.

  • Stuxnet
  • Cyberwarfare
  • Industrial Control Systems
  • Security Threats
  • American/Israeli Origins

Uploaded on Apr 16, 2024 | 2 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Stuxnet the Changing Face of Cyberwarfare

  2. Introduction A malicious computer worm First uncovered in 2010 by VirusBlokAda Co.

  3. Stuxnet 500KB several programming language Four zero-day flaws executes all routines related to the main payload of the attack a worm automatically executes the propagated copies of the worm a link file responsible for hiding all malicious files and processes, preventing detection of the presence of Stuxnet. a rootkit component

  4. Threat The first visible example of industrial cyberwarfare Targeting industrial control systems Infected over 200,000 computers and caused 1,000 machines to physically degrade The most sophisticated cyberweapon

  5. Target SCADA (Supervisory Control And Data Acquisition) PLCs (Programmable Logic Controller) It is typically introduced to the target environment via an infected USB flash drive.

  6. Affected countries 58.85% Iran 18.22% Indonesia 8.31% India 2.57% Azerbaijan 1.56% United States 1.28% Pakistan Other countries 9.2%

  7. Neither country has admitted responsibility The worm is frequently described as a jointly built American/Israeli cyberweapon.

  8. Problems Worry for security experts and government officials is an act of cyberwarfare against a critical resource Electric grid Financial systems Communications systems

  9. Q&A

  10. Q&A USB

Related


More Related Content

giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#giItT1WQy@!-/#