ICS 8 - Introduction to Computer Security Homework 5, 50 Points
Due: Tuesday, November 2, 2010, at the beginnning of class
-
Do a search on the Internet for articles about the Stuxnet Worm,
and write a short essay about it.
Describe in general terms how this worm
is constructed and what it is attacking.
Include in your essay
an identification of the exploits used by this worm and whether there
is anything unusual about them.
Speculate as to the identities
and motives of its designers.
Finally, be sure to cite all your sources.
20 points.
-
Problem R-5.1 from Chapter 5, Goodrich-Tamassia, Intro. to
Computer Security, 5 points.
-
Problem R-5.7 from Chapter 5, Goodrich-Tamassia, Intro. to
Computer Security, 5 points.
-
Problem R-5.9 from Chapter 5, Goodrich-Tamassia, Intro. to
Computer Security, 5 points.
-
Problem R-5.13 from Chapter 5, Goodrich-Tamassia, Intro. to
Computer Security, 5 points.
-
Problem R-5.15 from Chapter 5, Goodrich-Tamassia, Intro. to
Computer Security, 5 points.
-
Problem C-5.1 from Chapter 5, Goodrich-Tamassia, Intro. to
Computer Security, 5 points.
Please write no more than a single paragraph for an answer
to any R- or C-question.
In many cases, a single sentence could be sufficient.