Stuxnet Worm

Description

6086
Chava Hariprasad
Mind Map by Chava Hariprasad, updated more than 1 year ago
Chava Hariprasad
Created by Chava Hariprasad over 8 years ago
4
0

Resource summary

Stuxnet Worm
  1. Recovery
    1. Incident procedures
      1. Network/system isolation
        1. Backups
          1. Disciplinary and legal action
          2. Detection
            1. Antivirus software
              1. Network and systems monitoring
                1. Intrusion Detection Systems
                  1. Alert staff
                  2. Prevention
                    1. Antivirus software
                      1. Perimeter controls
                        1. Policies, standards, guidelines
                          1. Procedures with awareness and compliance
                          2. Threats
                            1. Malicious programmers
                              1. Disgruntled employees
                                1. Hackers/crackers
                                  1. Industrial spies
                                    1. Organized criminals
                                      1. Terrorists,hacktivists
                                        1. Nation states
                                        2. Vulnerabilities
                                          1. Network communications
                                            1. Data sharing
                                              1. Trusted/ privileged insiders
                                              2. Impacts
                                                1. Unauthorized disclosure
                                                  1. Unauthorized modification
                                                    1. Unauthorized destruction or Denial of service
                                                    Show full summary Hide full summary

                                                    Similar

                                                    Plant Structure and Photosynthesis
                                                    mckenziedev
                                                    Gender Theorists
                                                    Hazel Meades
                                                    Common Irish Words
                                                    silviaod119
                                                    Exchange surfaces and breathing
                                                    megan.radcliffe16
                                                    How does Shakespeare present villainy in Macbeth?
                                                    maxine.canvin
                                                    GCSE AQA Physics - Unit 3
                                                    James Jolliffe
                                                    GCSE History – The early years and the Weimar Republic 1918-1923
                                                    Ben C
                                                    How did the Cold War develop?
                                                    E A
                                                    MICROSOFT WORD 2013 SKILLS FOR WORK
                                                    John O'Driscoll
                                                    MAPA MENTAL DISEÑO GRAFICO
                                                    Lizbeth Domínguez