{"id":615,"date":"2024-02-29T23:53:30","date_gmt":"2024-03-01T04:53:30","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/?p=615"},"modified":"2024-04-10T17:59:50","modified_gmt":"2024-04-10T21:59:50","slug":"the-learning-material-briefly-explained-stuxnet-the-video-below-gives-an-overview-of-the-attack-watch-it-and-connect-it-with-the-topics-you-learned-this-week-https-www-ted-com-t","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/2024\/02\/29\/the-learning-material-briefly-explained-stuxnet-the-video-below-gives-an-overview-of-the-attack-watch-it-and-connect-it-with-the-topics-you-learned-this-week-https-www-ted-com-t\/","title":{"rendered":"Module 7: The learning material briefly explained \u201cStuxnet\u201d. The video below gives an overview of the attack. Watch it and connect it with the topics you learned this week. Also provide your views on why Stuxnet is actually complicated and any other interesting articles you found online."},"content":{"rendered":"\n<figure class=\"wp-block-embed is-type-video is-provider-ted wp-block-embed-ted wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/www.ted.com\/talks\/ralph_langner_cracking_stuxnet_a_21st_century_cyber_weapon\/transcript?language=en#t-298947\\\n<\/div><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>In this class for Module 7, the class learned about the National Vulnerability Database which gives a score called CVSS which stands for Common Vulnerability Scoring System. This system lists the vulnerabilities found in databases in a score that reflects the severity of the vulnerability. In a July 2010 attack, Stuxnet was given a CVSS Version 2.0 rating of 6.9 which is classified as a medium, and a CVSS Version 3.x rating of 7.8 which is high. More of the description can be found in the resource link below.&nbsp;<\/p>\n\n\n\n<p>According to the readings, Stuxnet used several zero-day vulnerabilities to gain access. A zero-day vulnerability is a vulnerability that exists but is unknown. Day zero is the day the vulnerability is found. These scores and vulnerabilities help understand, prevent, and stay vigilant internationally.<\/p>\n\n\n\n<p><strong>References:<\/strong><\/p>\n\n\n\n<p>Langner, R. (n.d.).&nbsp;<em>Cracking Stuxnet, a 21st-century cyber weapon<\/em>&nbsp;[Video]. TED Talks.&nbsp;https:\/\/www.ted.com\/talks\/ralph_langner_cracking_stuxnet_a_21st_century_cyber_weapon\/transcript?language=en<\/p>\n\n\n\n<p><em>NVD &#8211; CVE-2010-2772<\/em>. (n.d.).&nbsp;https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2010-2772<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this class for Module 7, the class learned about the National Vulnerability Database which gives a score called CVSS which stands for Common Vulnerability Scoring System. This system lists the vulnerabilities found in databases in a score that reflects&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/2024\/02\/29\/the-learning-material-briefly-explained-stuxnet-the-video-below-gives-an-overview-of-the-attack-watch-it-and-connect-it-with-the-topics-you-learned-this-week-https-www-ted-com-t\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27258,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[17],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/615"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/users\/27258"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/comments?post=615"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/615\/revisions"}],"predecessor-version":[{"id":742,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/posts\/615\/revisions\/742"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/media?parent=615"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/categories?post=615"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/tags?post=615"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}