preview

Cyber Warfare Is A Major Concern For The Global Society

Better Essays

Cyber warfare is a major concern for the global society. The introduction, development and operation of information and communication technologies have been accompanied by an increase in criminal accomplishments. With regard to cyberspace, the Internet is increasely been used as a tool and medium by organized crime. In order to commit cybercrime, cyber weapon are needed.
The first known cyber weapon to have ever been created was the Stuxnet virus that was discovered in the late summer of 2010. To say it was a computer virus isn’t right because a computer virus relies on an unwitting victim to instill it, whereas a worm often spread over a computer network on its own. Stuxnet was a 500kb computer worm that infected the software of at least …show more content…

This worm was an unprecedentedly masterful and malicious piece of code that conducted attacks in three stages. It starts by targeted Microsoft Windows machines and networks while repeatedly replicating itself. It then sought out Siemens Step7 software, which is also Windows-based that is used to program industrial control systems that operate equipment, such as centrifuges. And finally, it compromised the programmable logic controllers. The worm’s creators could therefore spy on the industrial systems and even cause the fast-spinning centrifuges to tear themselves apart, unknown to the engineers at the plant.
In order for the original Stuxnet worm to work correctly it has to be introduced into a system, usually via an infected USB thumb drive/flash drive. Once the USB thumb drive is inserted into a system, it proceeds to infect all machines running Microsoft Windows. It does this by displaying a digital certificate that seems to show that it comes from a reliable company, the worm is able to evade automated-detection systems. It then checks whether a given machine is part of the targeted industrial control system made by Siemens. If it isn’t the right system, the worm does nothing. However if it is the right system the worm attempts to access the Internet and download a more recent version of itself. So to say it goes through a sequence of checks to actually determine if this is the right target. It 's kind

Get Access