2012
DOI: 10.3390/fi4030672
|View full text |Cite
|
Sign up to set email alerts
|

Stuxnet: What Has Changed?

Abstract: This paper considers the impact of Stuxnet on cyber-attacks and cyber-defense. It first reviews trends in cyber-weapons and how Stuxnet fits into these trends. Because Stuxnet targeted an industrial control system in order to wreak physical damage, the focus is on weapons that target systems of that type and produce physical effects. The paper then examines the impact of Stuxnet on various domains of action where cyber-attacks play a role, including state-level conflict, terrorism, activism, crime, and pranks.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 68 publications
(25 citation statements)
references
References 2 publications
0
25
0
Order By: Relevance
“…One of the local host which is infected with a modern botnet malware starts scanning his neighbors in order to propagate via network. It uses similar network propagation mechanism as it is employed in Stuxnet worm [129,130]. Malware is looking for hosts with open TCP and UDP ports reserved for Microsoft Remote Procedure Call (RPC).…”
Section: Scenariomentioning
confidence: 99%
“…One of the local host which is infected with a modern botnet malware starts scanning his neighbors in order to propagate via network. It uses similar network propagation mechanism as it is employed in Stuxnet worm [129,130]. Malware is looking for hosts with open TCP and UDP ports reserved for Microsoft Remote Procedure Call (RPC).…”
Section: Scenariomentioning
confidence: 99%
“…One famous cyber-attack on Iran's power hly modified Stuxnet virus [14]. ch trend is now looking at how mechanisms to protect CI ICT y established PROTECT centre etwork security mechanisms are nhance protection of CIs beyond of firewalls and Intrusion These include strong user Zones (DMZs), system and ystems, and many others [16].…”
Section: On Of Connectivity In Scadamentioning
confidence: 99%
“…Rather, the material realities of computer networks and malicious activities taking place in or through them that manifest as “digital accidents” shape the threat representations in this cluster. New categories of threats were formed in government circles and think‐tanks by linking the prefix “cyber‐” to established and known threats to security, thus creating terms such as cyber‐vandalism, cyber‐crime, cyber‐espionage, cyber‐terror, or cyber‐war (Denning ). “Old” forms of deviant behavior become “new” as they are imbued with a sense of “through the use of a computer” or “related to cyberspace.” The exact origin of these terms is sometimes hard to fathom, and tracking down the provenance for individual terms would be a lengthy undertaking; what seems most relevant in the context of this article is that behind all of these categories is in essence the archetype/stereotype of the “hacker,” individuals with technical superpowers.…”
Section: Cyber‐threat Representations: Creating and Changing “The Resmentioning
confidence: 99%