Essays about: "Stuxnet"

Showing result 1 - 5 of 6 essays containing the word Stuxnet.

  1. 1. UPLOADING WAR: The Weaponisation of 0s and 1s and the Changing Nature of War

    University essay from Göteborgs universitet/Statsvetenskapliga institutionen

    Author : Noah Bell; [2021-02-25]
    Keywords : war; cyberwar; cyberattacks; violence; legitimacy; maps;

    Abstract : As digital technology revolutionises the world, it is not surprising that it is altering the way states conduct themselves, especially in terms of war. War is a powerful policy tool of states and its implications are massive. READ MORE

  2. 2. Cyber resilience for critical infrastructure : A systematic review

    University essay from Högskolan i Skövde/Institutionen för informationsteknologi

    Author : Vahid Naserinia; [2021]
    Keywords : Cyber resilience; critical infrastructures; systematic review;

    Abstract : Critical infrastructure is a term to define the network of crucial assets for the functioning of a society and modern economies. The complexity of critical infrastructures and the ability to connect smart devices to these networks make them more vulnerable to cyberattacks. READ MORE

  3. 3. Weaponized malware, physical damage, zero casualties – what informal norms are emerging in targeted state sponsored cyber-attacks? : The dynamics beyond causation: an interpretivist-constructivist analysis of the US media discourse regarding offensive cyber operations and cyber weapons between 2010 and 2020

    University essay from Försvarshögskolan

    Author : Margarita Sallinen; [2021]
    Keywords : constructivism; critical discourse analysis; cyber operations; cyber security; cyber warfare; cyber weapons; interpretivism; informal norms; media; war studies;

    Abstract :  In 2010, the discovery of the malicious computer worm Stuxnet shocked the world by its sophistication and unpredictability. Stuxnet was deemed as the world’s first cyber weapon and started discussions concerning offensive cyber operations – often called “cyber warfare” – globally. READ MORE

  4. 4. SECURITY VULNERABILITIES IN INDUSTRIAL PLC SOFTWARE: A TAXONOMY AND A SYSTEMATIC MAPPING STUDY

    University essay from Mälardalens universitet/Inbyggda system

    Author : Kejsi Biçoku; [2021]
    Keywords : ;

    Abstract : In the past few years, there has been extensive use of Industrial Control Systems (ICSs) in various critical industries ranging from manufacturing, re neries, and automotive to power generation,wastewater, and power plants. Their deployment in critical infrastructures increased the need to ensure their security. READ MORE

  5. 5. Coercive instruments in the digital age : The cases of cyber-attacks against Estonia and Iran

    University essay from Försvarshögskolan

    Author : Hrafn Steiner; [2014]
    Keywords : Coercive diplomacy; cyberwar; cyber-attack; Stuxnet; DDoS; hacktivist;

    Abstract : In the wake of the cyber-attacks in 2007 against Estonia and in 2010 against Iran, academics have debated the character of cyberwar. This study applies the theories of coercive diplomacy to the cases of Estonia and Iran in order to explain cyber-attacks as instrument for coercive diplomacy. READ MORE