Zusammenfassung der Ressource
Stuxnet
Worm
- Recovery
- Incident procedures
- Network/system isolation
- Backups
- Disciplinary and legal action
- Detection
- Antivirus software
- Network and systems monitoring
- Intrusion Detection Systems
- Alert staff
- Prevention
- Antivirus software
- Perimeter controls
- Policies, standards, guidelines
- Procedures with awareness and compliance
- Threats
- Malicious programmers
- Disgruntled employees
- Hackers/crackers
- Industrial spies
- Organized criminals
- Terrorists,hacktivists
- Nation states
- Vulnerabilities
- Network communications
- Data sharing
- Trusted/ privileged insiders
- Impacts
- Unauthorized disclosure
- Unauthorized modification
- Unauthorized destruction or Denial of service