Stuxnet Not Different From Many Malware, Says Expert
A cyber-security debate, which was held on Capitol Hill (Washington D.C., USA), likely focused on the dangers associated with Stuxnet. A PC worm, Stuxnet struck during September 2010 when it tried to bring down operating systems and industrial infrastructures. However, according to Adam Meyers of SRA International, who's chief of the cyber-security wing at the major IT security company, the Stuxnet malware wasn't game-changing. ExecutiveGov reported this on November 24, 2010.
Actually, during the recent time, Stuxnet, which hit critical infrastructure in Iran as well as demonstrated its power to wage a cyber assault leading to turmoil, has been making plenty of noise, apparently, in the form of a game-changer. Yet the malware isn't any different from many other malicious programs.
Meyers stated that it was possible Stuxnet surprised those who didn't know about the program's abilities. According to him, for many who had not come across the worm, it was an unexpected exposure that attack was possible on data acquisition and supervisory control systems as well as event command systems, while malicious software could navigate between open and closed networks like a USB port. He added that some people felt the worm therefore behaved like a game-changer, although he thought it was what they perceived about the malware. Nextgov published this on November 23, 2010.
Furthermore, Meyer delineated certain perspective vis-à-vis the threat. He said that as a positive perspective, some actors, who were capable, were enthused with any kind of target from classified to financial data. These actors, in other words hackers, were growing daily, both in their abilities and in numbers, using more-and-more sophisticated tools. So it was necessary to perceive and safeguard all of the targets, Meyers reasoned. The New News reported this on November 24, 2010.
Meanwhile, the method for tackling threats was using the intelligence process and proceeding systematically, In one instance, forensics of intelligence system, drive forensics, malicious software examination, reverse engineering followed with reporting were the steps undertaken. He explained that information intelligence was extracted regarding what was known from one step to another so that the network could be better protected. Nextgov published this.
» SPAMfighter News - 06-12-2010