Skip to Main Content
Have library access? Log in through your library
A Cyberworm that Knows No Boundaries

A Cyberworm that Knows No Boundaries

Isaac R. Porche
Jerry M. Sollinger
Shawn McKay
Copyright Date: 2011
Published by: RAND Corporation
Pages: 54
  • Cite this Item
  • Book Info
    A Cyberworm that Knows No Boundaries
    Book Description:

    It has become clear that Stuxnet-like worms pose a serious threat even to critical U.S. infrastructure and computer systems that are not connected to the Internet. However, defending against such attacks involves complex technological and legal issues. In particular, at the federal level, different organizations have different responsibilities and levels of authority when it comes to investigating or defending against intrusions.

    eISBN: 978-0-8330-5980-2
    Subjects: Technology

Table of Contents

  1. Front Matter
    (pp. i-ii)
  2. Preface
    (pp. iii-iv)
  3. Table of Contents
    (pp. v-vi)
  4. Figures and Tables
    (pp. vii-viii)
  5. Summary
    (pp. ix-xii)
  6. Acknowledgments
    (pp. xiii-xiv)
  7. Abbreviations
    (pp. xv-xvi)
  8. A Cyberworm That Knows No Boundaries
    (pp. 1-18)

    In 2009, cyber security analysts worldwide reported that a “worm” called Stuxnet had penetrated and, in all likelihood, damaged an Iranian nuclear facility.¹ The attack was apparently prosecuted through the facility’s industrial control system. Iran later confirmed that Stuxnet had indeed infected computers and control systems in its uranium enrichment complex at Natanz and had damaged centrifuges there.²

    The nature of the incident did not surprise those who had known that such an attack was theoretically possible (see, e.g., Edwards and Stauffer, 2008). The likelihood of such a targeted attack was revealed as long ago as 1997, when a U.S....

  9. APPENDIX A The Cyberspace Domain
    (pp. 19-20)
  10. APPENDIX B Worms
    (pp. 21-24)
  11. APPENDIX C Einstein Intrusion Detection and Protection
    (pp. 25-26)
  12. APPENDIX D Federal Cyber Legislation
    (pp. 27-32)
  13. Bibliography
    (pp. 33-38)