kschulz4at September 07,2017 First off I want to say how interesting and fascinating it is to learn more and more about Stuxnet. It's really cool to hear how it got to the correct system, how it interacted with the systems, how it prevented people from stopping it AND how it wasn't detected until it was too late. The level of coordination and the deep understanding, of very specific system, had to be major. On the other hand, this terrifies me. This is a perfect example of how a really well connected/funded group or a nation can penetrate a nations security. What if this had been release in the U.S. and instead of messing with the rotation, it caused a meltdown? I question I would like answered is how did Stuxnet get onto the networks because I'm curious if just basic security precautions would have prevented it (ex: not plugging in a USB you found lying around, using inadequate policies for transferring between unsecured and secure networks)? I'm guessing as time goes on and tensions between nations get hotter, that events like these will be more common.
cmartiat September 07,2017 Cyber warfare can be done and can use our software Stuxnet that uses logic. Can discover the proper computers. Threats can find its way to a computer and spreads. This can find and store its flaws on a database.
gwlongat September 07,2017 Stuxnet is a fascinating example of the different aspects that all need to be considered in security - cryptography, software security, antivirus detection methods, etc. While impressive due to the amount of things it got right, even stuxnet wasn't perfect - it hit many countries, and probably not all of them intentional (including the United States, who along with Israel are believed to have created the worm in the first place). The science of not only creating but controlling this kind of malware is really interesting to me, because any weapon that is powerful could theoretically be used against you one day. In fact, I've heard that variants of Stuxnet have been traded on the black market for nefarious purposes. So the trick is, how do we design a cyber weapon that can never potentially blow back on us? I'm not sure it's possible...
lnguye46at September 11,2017 Very informative! Such a powerful development. Stuxnet uses 7 different mechanisms. The speaker did a wonderful job in explaining and breaking down Stuxnet and how it spread and gain control of the system. It’s interesting to know that the good and bad guys have access to the same technology.
stkramergmu3at September 16,2017 There is a book on Stuxnet and the people who reverse engineered it that I would recommend. It's called Countdown to Zero: https://www.amazon.com/dp/B00KEPLC08/ref=dp-kindle-redirect?_encoding=UTF8&btkr=1.