ICS 8 - Introduction to Computer Security Homework 5, 50 Points
Due: Tuesday, November 2, 2010, at the beginnning of class

  1. Do a search on the Internet for articles about the Stuxnet Worm, and write a short essay about it. Describe in general terms how this worm is constructed and what it is attacking. Include in your essay an identification of the exploits used by this worm and whether there is anything unusual about them. Speculate as to the identities and motives of its designers. Finally, be sure to cite all your sources. 20 points.
  2. Problem R-5.1 from Chapter 5, Goodrich-Tamassia, Intro. to Computer Security, 5 points.
  3. Problem R-5.7 from Chapter 5, Goodrich-Tamassia, Intro. to Computer Security, 5 points.
  4. Problem R-5.9 from Chapter 5, Goodrich-Tamassia, Intro. to Computer Security, 5 points.
  5. Problem R-5.13 from Chapter 5, Goodrich-Tamassia, Intro. to Computer Security, 5 points.
  6. Problem R-5.15 from Chapter 5, Goodrich-Tamassia, Intro. to Computer Security, 5 points.
  7. Problem C-5.1 from Chapter 5, Goodrich-Tamassia, Intro. to Computer Security, 5 points.
Please write no more than a single paragraph for an answer to any R- or C-question. In many cases, a single sentence could be sufficient.