Stuxnet Mitigation: Defense in Depth Needed
Stuxnet experts are jumping out from everywhere saying they know how to mitigate the worm and clear up any issues a system might have. There seem to be some differences in approach, but one thing is pretty much agreed to by all...
Stuxnet experts are jumping out from everywhere saying they know how to mitigate the worm and clear up any issues a system might have.
There seem to be some differences in approach, but one thing is pretty much agreed to by all: No single solution will block an attack like Stuxnet, but a comprehensive solution of countermeasures including process and policy can significantly reduce the negative consequences that result from such an attack.
Knowing this in advance means any mitigation strategy needs to be based on a solid defense-in-depth strategy that utilizes multiple, independent layers of protection. The members of the Cyber Security Forum Initiative (CSFI) Stuxnet Project agree while it will always be possible to find flaws in any one solution it should be increasingly difficult to find and exploit flaws in a comprehensive solution that depends on multiple protective measures.
Case Study Database
Get more exposure for your case study by uploading it to the Control Engineering case study database, where end-users can identify relevant solutions and explore what the experts are doing to effectively implement a variety of technology and productivity related projects.
These case studies provide examples of how knowledgeable solution providers have used technology, processes and people to create effective and successful implementations in real-world situations. Case studies can be completed by filling out a simple online form where you can outline the project title, abstract, and full story in 1500 words or less; upload photos, videos and a logo.
Click here to visit the Case Study Database and upload your case study.