StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Technology Used in Cybercrimes - Research Proposal Example

Cite this document
Summary
This paper “The Technology Used in Cybercrimes” seeks to give an in-depth analysis of the Stuxnet computer virus, which attacked the Iranian uranium plant. This computer worm was detected in June 2010. The virus was observed to have been made and programmed to run on Microsoft Windows…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.2% of users find it useful
The Technology Used in Cybercrimes
Read Text Preview

Extract of sample "The Technology Used in Cybercrimes"

Introduction The technology used in cybercrimes has been on the increase and has led to large loses among various s and organizations across the world. As a result, various strategies have been implemented in a bid to ensure that control over such attacks is conducted in time. Due to the high risks posed, weakness potential for attacks has to be identified and controlled. This paper seeks to give an in-depth analysis of the Stuxnet computer virus, which attacked the Iranian uranium plant. Stuxnet This computer worm was detected in June 2010.

The virus was observed to have been made and programmed to run on Microsoft windows targeting Siemens products (Clark, Hakim and Ostfeld 15). This was advancement in the cybercrime through which, the programmable logic of the Siemen products, which is mainly used to reprogram the equipment, was altered. Despite the worm being observed in Indonesia, India, Azerbaijan, United States, and Pakistan, the virus was observed to have targeted five Iranian organizations (Andreasson 38). The worm was observed to be different from others since it was designed to attack specific computers.

In addition, the infected computers were at a capacity to spread the worm to only three other computers. In the attack, the worm altered the operations of the Industrial Process Control Sensor Signals, such that the system could not stop in case of a problem. Breach Computer security entails protection of information from theft and manipulations, which would have adverse effects on the operations of the organization (Pfleeger, Charles and Pfleeger Shari 114). This is mainly because when valuable information is availed to opponents, it can act as a strong weapon used to fight them.

This is achieved either directly or indirectly. In the case of Stuxnet virus, the manipulation of the programs on the Siemen equipment to alter the normal operation of the uranium plant was bleach. Breach execution The execution of the attack was highly planned and brought forth the possibility of massive revolutions in cybercrime. The attack was executed through the windows operating platform and targeted Siemens industrial software PCS7, WinCC, STEP7, and S7 PLCs. The virus was specifically designed to attack supervisory control and Data Acquisition Computer Systems.

The virus was shared among the computers by the use of a universal serial bus. This was evident in United States of America and Iran among others. Because not all computers are connected to the internet and had USB used to transfer data, the local area network of an institution was used to spread the virus. This ensured that a large number of computers in the private network were infected. The virus was unique in that it was large and was made on C and C++ programing languages. The digital signatures of Realtek was stolen and used in the making of the virus, which was very useful in installing rootkit drivers (Knapp 38).

This ensured that the detection of the virus could be more complex. Once in the windows operating system, the virus was in a capacity to attack Siemens ‘control systems. The s7otbxdx.dll key of WinCC is altered which makes it possible for the equipment to be programmable. This ensures that the virus is effectively installed in the equipment. The virus attacks equipment of operation frequency between 807HZ and 1210 HZ and modifies the frequency. This alters the normal operation of the equipment.

Losses of confidentiality, integrity, and availability Confidentiality, integrity, and availability are the considerations used in accounting for a breach in computer security. Confidentiality refers to the availability of information and control to only authorized persons. Integrity refers to lack of capacity to unauthorized persons to make any modification while availability refers to accessibility to authorized persons at specified time. In the case of Stuxnet virus, unauthorized persons made modification on the Siemen’s equipment program.

As a result, malfunction was evident in the Iranian Uranium plant, which led to much loss to the country at large. Technological improvements that would help prevent recurrence In a bid to detect and remove the Stuxnet virus, Siemen has launched a program that is to enable victims to control it. Since USB are used to spread the virus, third parties should not be allowed to use them. In addition, the private network should be regularly monitored and effective strategies put in place to ensure that no such attacks are executed and in case they are executed, they are identified at an early stage.

In ensuring this is effectively conducted, the network is divided into various security zones such as safety intergrated zone, basic control zone, supervisory zone, process information zone and Information Network zone. These zones are then handled individually. Conclusion Stuxnet virus was one of the latest high technology cybercrime. Through the attack, various organizations lost confidentiality in their sensitive information and consequently large losses. The worm was designed to attack Siemen equipment and windows operating system thus altering their normal operation.

In curbing the spread and loss caused by the virus, Siemen has launched a program that identifies and destroys the virus. Works Cited Andreasson, Kim. Cybersecurity: Public Sector Threats and Responses. New York: CRC, 2011. Print. Clark Robert, Hakim Simon, and Ostfeld Avi. Handbook of Water and Wastewater Systems Protection. New York: Springer, 2011. Print. Knapp, Eric. Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems.

Amsterdam, Netherlands: Elsevier, 2011. Print. Pfleeger, Charles and Pfleeger Shari. Security in computing. Prentice Hall, 2007. Print.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Research Essay (Stuxnet Virus) CyberSecurtiy Example | Topics and Well Written Essays - 750 words”, n.d.)
Research Essay (Stuxnet Virus) CyberSecurtiy Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/information-technology/1439862-research-essay-stuxnet-virus-cybersecurtiy
(Research Essay (Stuxnet Virus) CyberSecurtiy Example | Topics and Well Written Essays - 750 Words)
Research Essay (Stuxnet Virus) CyberSecurtiy Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/information-technology/1439862-research-essay-stuxnet-virus-cybersecurtiy.
“Research Essay (Stuxnet Virus) CyberSecurtiy Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/information-technology/1439862-research-essay-stuxnet-virus-cybersecurtiy.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Technology Used in Cybercrimes

Operation Ghost Click

The crime interested me since it demonstrated how competition in development of software has led to increase in cybercrimes.... Computer Crime and Computer Forensics Date Computer Crime and Computer Forensics cybercrimes have become a common phenomenon across the globe.... This essay is a review of three cybercrimes.... This depicts the sophisticated nature of cybercrimes.... The case depicted how the levels of cybercrimes have increased....
3 Pages (750 words) Essay

Cybercrime - Illegitimate Use of Internet

In a typical case, certain computers could be used in committing cybercrimes or the same computers could be targeted.... This paper addresses cybercrimes in terms of how the problem started, and its current position.... ) claims that the availability of various opportunities in innovation were the main initiating aspects of cybercrimes.... Such advancements gave birth to computer crime as people looked for better chances to benefit both rightly and through evil actions such as cybercrimes....
9 Pages (2250 words) Research Paper

Cybercrime and Digital Evidence

hellip; However, the current laws that are being applied in the cybercrimes are outdated; thus, proving to be ineffective in curbing the cybercrimes (Maras 94).... Therefore, the inability of laws to keep the pace with advancement in computer technology will lead to many cybercrimes unpunished regardless the increase in these criminal actions.... The currently increasing modes of cybercrimes include encryption and anonymity that are growing to advance levels....
3 Pages (750 words) Assignment

Human Factors and the Insider Threat

This will reduce the amount of cybercrimes which includes hacking, transferring the data and others.... cybercrimes take place at a high rate including personal information being leaked, invasion in the data of national concern, hacking accounts etc.... The reasons for the cybercrimes may be many from personal to professional.... However, managing the cybercrimes can be very challenging as recently seen it has become a challenge...
5 Pages (1250 words) Research Paper

Capacity Building as an International Response to Cybercrime

This discussion stresses that cybercrimes are offences against computer systems, which are conducted within or via computer networks.... From the srudy findings it is clear that technologies used by people globally are required to be organised for better usage in terms of social consideration.... It is apparent that Information and communication technology (ICT) has been rapidly transformed over the past two decades especially in the northern and southern regions of the world owing to which numerous development has been observed in various domains....
15 Pages (3750 words) Assignment

Evolution of Cybercrime

cybercrimes have been a major challenge to the government and with the growth of technology, they have become even more difficult to solve.... This is then followed by a comprehensive view of the challenges faced by the law Lastly, the essay provides a conclusion that looks into how technology can be used by the law enforcement agencies to prevent and address identity theft as well as how such technology can be of benefit to the society.... technology has made it easier for white-collar criminals to gain access to the information of many citizens....
14 Pages (3500 words) Assignment

Fighting Cyber-crimes

There are many kinds of cybercrimes that exist: internet fraud, computer hacking, spreading of malicious code or viruses, cyber piracy and many more.... Many kinds of cybercrimes exist: internet fraud, computer hacking, spreading of malicious code or viruses, cyberpiracy, and many more.... ob Smith who was a residence of Oklahoma, observed that his credit card had been used by some criminal who did fraudulent purchases....             Bob Smith, a resident of Oklahoma, observed that his credit card had been used by some criminals who made fraudulent purchases....
5 Pages (1250 words) Report

The Cyber Threats in Saint Louis County

This provision must abandon the restrictive laws binding agencies involved in investigating cyber-crime so that they are able to carry out internet spying and are empowered to spy cybercrimes easily.... Louis County due to this rising concern focuses on establishing a task force unity that is capable of investigating cybercrimes effectively.... As witnessed cybercrimes have increased to such an extent that the level of organized crime has significantly augmented which has become a huge threat for national security....
9 Pages (2250 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us