Premium Essay

Csec 620 Ia

In:

Submitted By pattersonck
Words 2306
Pages 10
Hacker Culture and Mitigation: Nuclear Power Facility
Khamara Harris
University of Maryland University College CSEC 620
Table of Contents
Abstract Page 3
Introduction Page 4
Threat Actors Page 4
Motives Page 5
Methods of Preventing/Discouraging Hackers Page 7
Conclusion Page 8
References Page 9
Abstract
"All states possess an inherent right to self-defense, and we recognize that certain hostile acts conducted through cyberspace could compel actions under the commitments we have with our military treaty partners," says the report. "We reserve the right to use all necessary means—diplomatic, informational, military, and economic—as appropriate and consistent with applicable international law."
Anderson, 2012
Hacker Culture and Mitigation: Nuclear Power Facility
Introduction
In the past few years cyber warfare has been at an all-time high. War is no longer just bombs and weapons, but targeting a nation’s critical infrastructure as a means to benefit the other. Lately the most valuable target has been Nuclear power facilities. The largest attack on a nuclear power facility started in 2006 when President Bush was in office. President Bush and the NSA named the attack code name: Olympic Games but was later named STUXNET after that bug had been found in 2010. At this point in time STUXNET has been the most powerful cyber-attack launched by the United States. For many years STUXNET was so sophisticated that it was able to target Iran’s nuclear power facility known as Natanz by crashing centrifuges. The worm was able to be hidden to look as if the facility was undergoing normal mechanical hardships. Much to Iran’s surprise they were actually under a massive cyber-attack, which would slow down their production of uranium. This of which is used to create bombs, explaining the underlying reasons for which the attack was

Similar Documents

Free Essay

Csec 620 Individual Assignment 1

...IA#1 Cybercrime Law, Regulation, Effects on Innovation John Doe CSEC 620 Section 9022 Note: This paper was submitted through originality check websites. Table of Contents 1. Introduction 3 2. Private Industry & Regulations 4 3. National Security Concerns 4 4. Methods 6 5. Impacts of Government Regulation 7 6. Compliance 8 7. Responsibility 9 8. The Real World 10 9. Conclusion 11 References 12 1. Introduction Cybersecurity and cybersecurity initiatives are commonplace in all aspects of our digital lives. Personal computers are still widely used, especially in the workplace, but mobile devices seem to be the preferred computing choice of the average person. This would include but not be limited to; smart phones, tablets, and laptops to name a few. Mobile devices have changed the digital landscape in a manner that could not have been predicted. This is because other than work or school related activities, most personal computers were used to play a few games, check email, and browse the internet. These activities eventually transitioned over to the aforementioned mobile devices. Now we mix in social media, and a whole new digital cyber-world has emerged. Talk about getting your head out of the clouds. We live in the cloud, literally and figuratively. What does this mean to the average consumer? Perhaps not much. Most people who operate in the digital world could probably care less about the underpinnings of cyberspace and...

Words: 2894 - Pages: 12

Premium Essay

Esrgt

...UNDERGRADUATE REGULATIONS & SYLLABUSES 2014 - 2015 THE FACULTY OF SOCIAL SCIENCES TABLE OF CONTENTS MESSAGE FROM THE DEAN ............................................................. 3 UNDERGRADUATE PROGRAMMES ................................................ 4 ACADEMIC CALENDAR 2014-2015 ................................................ 5 DEFINITIONS ...................................................................................... 13 GENERAL INFORMATION & REGULATIONS .............................. 14 General Regulations for Bachelor of Science Degrees 14 Special Regulations for Degrees in Hospitality and Tourism Management........................................................... 27 Franchise Agreements .......................................................... 27 EVENING UNIVERSITY -GENERAL INFORMATION & REGULATIONS ................................................................................... 28 General Regulations for Bachelor of Science Degrees 28 General Regulations for Diploma Programmes ............ 36 General Regulations for Certificate Programmes ......... 37 STUDENT PRIZES .............................................................................. 38 CODE OF CONDUCT ........................................................................ 39 UNIVERSITY REGULATIONS ON PLAGIARISM .......................... 40 THE ACADEMIC SUPPORT/ DISABILITIES LIAISON UNIT (ASDLU) ..............................................................................................

Words: 77086 - Pages: 309