Stuxnet Worm

Chava Hariprasad
Mind Map by Chava Hariprasad, updated more than 1 year ago
Chava Hariprasad
Created by Chava Hariprasad over 4 years ago
3
0

Description

6086

Resource summary

Stuxnet Worm
1 Recovery
1.1 Incident procedures
1.2 Network/system isolation
1.3 Backups
1.4 Disciplinary and legal action
2 Detection
2.1 Antivirus software
2.2 Network and systems monitoring
2.3 Intrusion Detection Systems
2.4 Alert staff
3 Prevention
3.1 Antivirus software
3.2 Perimeter controls
3.3 Policies, standards, guidelines
3.4 Procedures with awareness and compliance
4 Threats
4.1 Malicious programmers
4.2 Disgruntled employees
4.3 Hackers/crackers
4.4 Industrial spies
4.5 Organized criminals
4.6 Terrorists,hacktivists
4.7 Nation states
5 Vulnerabilities
5.1 Network communications
5.2 Data sharing
5.3 Trusted/ privileged insiders
6 Impacts
6.1 Unauthorized disclosure
6.2 Unauthorized modification
6.3 Unauthorized destruction or Denial of service
Show full summary Hide full summary

Similar

River Processes and Landforms
1jdjdjd1
Bayonet Charge flashcards
katiehumphrey
Maths Revision
Asmaa Ali
GCSE AQA Biology - Unit 3
James Jolliffe
Physics 1A - Energy
Zaki Rizvi
Mapa Conceptual de Liderazgo
gabbi.mendoza
History- Medicine through time key figures
gemma.bell
FUNCTIONALIST ROLE OF EDUCATION
ashiana121
GCSE REVISION TIMETABLE
nimraa422
English spelling rules
Sarah Holmes
Specifc Topic 7.4 Timber (Impacts)
T Andrews