Chapter 20

The Stuxnet Worm and the Vulnerability of the U.S. Electric Power Grid

In the realm of information security, there are always new predators who present ever-more-advanced threats to the operation and control of our infrastructure. These types of attacks are stealthy and may employ both simple infection techniques and advanced approaches to malware to be spread after an initial infection has occurred. There are a variety of motives behind these advanced threats, which include political, national, and individual reasons. One of the most sophisticated of these advanced persistent threats emerged in the form of a worm identified as the Stuxnet worm. And Stuxnet is not alone. There are also a number of other infamous destructive threats, ...

Get Network and Data Security for Non-Engineers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.