SlideShare una empresa de Scribd logo
1 de 1
Does USA have a new INTERNET (network) in place?.....Attack against a Iran?



The recent Stuxnet , Duqu and Flame attacks on Iran have a lot of points to ponder upon. The
revelations that a super power state such as USA is responsible for these attacks which targeted Iran is
alarming.Before carrying out such attacks they must have surely thought over the fallouts.

Is USA Cyber space so secure that it is confident that no attacks will be carried out against them after
what has happened. Cyber war had started long back but it is the first nation to attack another nation.
The program named "Olympic Games" for creation of cyber weapons such as Stuxnet, Duqu and Flame
and program "Plan X" which is said to be to protect their critical infrastructure says for it all.

There is strong possibility that USA also has a parallel network(INTERNET) infrastructure in place and
thats why they are going all out in using cyber weapons. Have they replace the existing TCP/IP network
protocol with a new one or Have they migrated to IPv6 ensuring all security standards have been
implemented or have all vulnerability been patched bet OS or the applications they are using. There is
also a strong possibility of them shifting to private clouds thus reducing the chances of being vulnerable.

Más contenido relacionado

La actualidad más candente

Ethical hacking
Ethical hackingEthical hacking
Ethical hackingAman Singh
 
Network basic security
Network basic  securityNetwork basic  security
Network basic securityMohamed Radji
 
089 generictoptipsposter
089 generictoptipsposter089 generictoptipsposter
089 generictoptipsposterWarsi Wa
 
Technological invasion 23 nov 2018
Technological invasion   23 nov 2018Technological invasion   23 nov 2018
Technological invasion 23 nov 2018J A Bhavsar
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Cain Ransbottyn
 
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpointTy122987
 
ET4045-1-Introduction-2014
ET4045-1-Introduction-2014ET4045-1-Introduction-2014
ET4045-1-Introduction-2014Tutun Juhana
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)sayyed azam
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authenticationEdgar Mwangangi
 
Network security
Network securityNetwork security
Network securityNandini Raj
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)Hîmãlåy Làdhä
 

La actualidad más candente (15)

Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Network basic security
Network basic  securityNetwork basic  security
Network basic security
 
089 generictoptipsposter
089 generictoptipsposter089 generictoptipsposter
089 generictoptipsposter
 
Technological invasion 23 nov 2018
Technological invasion   23 nov 2018Technological invasion   23 nov 2018
Technological invasion 23 nov 2018
 
Hacking
HackingHacking
Hacking
 
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
Privacy is an Illusion and you’re all losers! - Cryptocow - Infosecurity 2013
 
Information technology powerpoint
Information technology powerpointInformation technology powerpoint
Information technology powerpoint
 
Privacy Primer
Privacy PrimerPrivacy Primer
Privacy Primer
 
Hackers
HackersHackers
Hackers
 
ET4045-1-Introduction-2014
ET4045-1-Introduction-2014ET4045-1-Introduction-2014
ET4045-1-Introduction-2014
 
Network security (syed azam)
Network security (syed azam)Network security (syed azam)
Network security (syed azam)
 
Network security desighn principles and authentication
Network security desighn principles and authenticationNetwork security desighn principles and authentication
Network security desighn principles and authentication
 
Network security
Network securityNetwork security
Network security
 
Hacking
HackingHacking
Hacking
 
Mobile security first round (1st rank)
Mobile security first round (1st rank)Mobile security first round (1st rank)
Mobile security first round (1st rank)
 

Similar a New internet

Intl502.cyberspace, cyber warfare
Intl502.cyberspace, cyber warfareIntl502.cyberspace, cyber warfare
Intl502.cyberspace, cyber warfareTpeisi Nesby
 
Back to the future - cyber security, privacy and visions of the future
Back to the future - cyber security, privacy and visions of the futureBack to the future - cyber security, privacy and visions of the future
Back to the future - cyber security, privacy and visions of the futureb coatesworth
 
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...Matthew Kurnava
 
The Future of National and International Security on the Internet
The Future of National and International Security on the InternetThe Future of National and International Security on the Internet
The Future of National and International Security on the InternetMaurice Dawson
 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINALNicholas Poole
 
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsBattlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsMaurice Dawson
 
Please reply one paragraph you thoughts on this research  Int.docx
Please reply one paragraph you thoughts on this research  Int.docxPlease reply one paragraph you thoughts on this research  Int.docx
Please reply one paragraph you thoughts on this research  Int.docxmattjtoni51554
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Avirot Mitamura
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismMaurice Dawson
 
CSFI Stuxnet Report
CSFI Stuxnet ReportCSFI Stuxnet Report
CSFI Stuxnet ReportAmr Ali
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
Secureview 2q 2011
Secureview 2q 2011Secureview 2q 2011
Secureview 2q 2011Felipe Prado
 
Stuxnet update 15_feb2011
Stuxnet update 15_feb2011Stuxnet update 15_feb2011
Stuxnet update 15_feb2011AngelaHoltby
 

Similar a New internet (20)

Intl502.cyberspace, cyber warfare
Intl502.cyberspace, cyber warfareIntl502.cyberspace, cyber warfare
Intl502.cyberspace, cyber warfare
 
Back to the future - cyber security, privacy and visions of the future
Back to the future - cyber security, privacy and visions of the futureBack to the future - cyber security, privacy and visions of the future
Back to the future - cyber security, privacy and visions of the future
 
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
 
The Future of National and International Security on the Internet
The Future of National and International Security on the InternetThe Future of National and International Security on the Internet
The Future of National and International Security on the Internet
 
The Stuxnet Virus FINAL
The Stuxnet Virus FINALThe Stuxnet Virus FINAL
The Stuxnet Virus FINAL
 
A tour of the worm
A tour of the wormA tour of the worm
A tour of the worm
 
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of ThingsBattlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
Battlefield Cyberspace: Exploitation of Hyperconnectivity and Internet of Things
 
Cyber
CyberCyber
Cyber
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Please reply one paragraph you thoughts on this research  Int.docx
Please reply one paragraph you thoughts on this research  Int.docxPlease reply one paragraph you thoughts on this research  Int.docx
Please reply one paragraph you thoughts on this research  Int.docx
 
Stuxnet
StuxnetStuxnet
Stuxnet
 
0857290053.pdf
0857290053.pdf0857290053.pdf
0857290053.pdf
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186Cybersecurity and-cyberwar-singer-en-22186
Cybersecurity and-cyberwar-singer-en-22186
 
Understanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber TerrorismUnderstanding the Methods behind Cyber Terrorism
Understanding the Methods behind Cyber Terrorism
 
CSFI Stuxnet Report
CSFI Stuxnet ReportCSFI Stuxnet Report
CSFI Stuxnet Report
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Secureview 2q 2011
Secureview 2q 2011Secureview 2q 2011
Secureview 2q 2011
 
technical disaster
technical disastertechnical disaster
technical disaster
 
Stuxnet update 15_feb2011
Stuxnet update 15_feb2011Stuxnet update 15_feb2011
Stuxnet update 15_feb2011
 

Más de Santosh Khadsare (20)

Cyber fraud (netflix)
Cyber fraud (netflix)Cyber fraud (netflix)
Cyber fraud (netflix)
 
INTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPSINTERNET SECUIRTY TIPS
INTERNET SECUIRTY TIPS
 
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
INDIAN NATIONAL CYBER SECURITY POLICY (NCSP-2013)
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
 
Network forensics1
Network forensics1Network forensics1
Network forensics1
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 
Lec 1 apln security(4pd)
Lec  1 apln security(4pd)Lec  1 apln security(4pd)
Lec 1 apln security(4pd)
 
Smart card
Smart cardSmart card
Smart card
 
Guassvirus
GuassvirusGuassvirus
Guassvirus
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Webmail
WebmailWebmail
Webmail
 
Linux Forensics
Linux ForensicsLinux Forensics
Linux Forensics
 
Web server
Web serverWeb server
Web server
 
Samba server
Samba serverSamba server
Samba server
 
Firewall(linux)
Firewall(linux)Firewall(linux)
Firewall(linux)
 
Securitytips
SecuritytipsSecuritytips
Securitytips
 
Linux basics
Linux basicsLinux basics
Linux basics
 
Linuxfilesys
LinuxfilesysLinuxfilesys
Linuxfilesys
 
Linuxconcepts
LinuxconceptsLinuxconcepts
Linuxconcepts
 
Introtolinux
IntrotolinuxIntrotolinux
Introtolinux
 

New internet

  • 1. Does USA have a new INTERNET (network) in place?.....Attack against a Iran? The recent Stuxnet , Duqu and Flame attacks on Iran have a lot of points to ponder upon. The revelations that a super power state such as USA is responsible for these attacks which targeted Iran is alarming.Before carrying out such attacks they must have surely thought over the fallouts. Is USA Cyber space so secure that it is confident that no attacks will be carried out against them after what has happened. Cyber war had started long back but it is the first nation to attack another nation. The program named "Olympic Games" for creation of cyber weapons such as Stuxnet, Duqu and Flame and program "Plan X" which is said to be to protect their critical infrastructure says for it all. There is strong possibility that USA also has a parallel network(INTERNET) infrastructure in place and thats why they are going all out in using cyber weapons. Have they replace the existing TCP/IP network protocol with a new one or Have they migrated to IPv6 ensuring all security standards have been implemented or have all vulnerability been patched bet OS or the applications they are using. There is also a strong possibility of them shifting to private clouds thus reducing the chances of being vulnerable.