Did a USB drive disrupt a nuclear program? A Defense in Depth (DiD) teaching case

Q2 Social Sciences
P. Datta, Thomas Acton
{"title":"Did a USB drive disrupt a nuclear program? A Defense in Depth (DiD) teaching case","authors":"P. Datta, Thomas Acton","doi":"10.1177/20438869231200284","DOIUrl":null,"url":null,"abstract":"Defense in Depth (DiD) has become an industry buzzword. But practicing DiD is easier said than done. While cybersecurity researchers have predominantly focused on securing corporate networks, there remains a serious gap in endpoint-threat awareness. Yet endpoint threats were the progenitor of 68% of breaches and hacks in 2019 (Computers Nationwide, 2022), a vulnerability that increased during the COVID-19 lockdown with relaxed BYOD (Bring Your Own Device) policies, more IoTs, and cheaper and larger USB flash drives. This teaching case uses the 2009 Stuxnet attack on Iran’s nuclear facilities to exemplify how a single USB drive was used as an endpoint threat to disrupt a nuclear infrastructure, drawing attention to the need for and how to practice DiD to counter towering complexities ushered in burgeoning endpoints cyberattacks, from hacks to ransomware. The case shows the need for DiD to simultaneously pay heed toward physical, technical, and processual (administrative) measures to prevent, defend, and mitigate cyberattacks, from hacks to ransomware. The case and its teaching notes highlight the opportunities and challenges of practicing DiD for endpoints, from flash drives to IoTs.","PeriodicalId":37921,"journal":{"name":"Journal of Information Technology Teaching Cases","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Information Technology Teaching Cases","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1177/20438869231200284","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 0

Abstract

Defense in Depth (DiD) has become an industry buzzword. But practicing DiD is easier said than done. While cybersecurity researchers have predominantly focused on securing corporate networks, there remains a serious gap in endpoint-threat awareness. Yet endpoint threats were the progenitor of 68% of breaches and hacks in 2019 (Computers Nationwide, 2022), a vulnerability that increased during the COVID-19 lockdown with relaxed BYOD (Bring Your Own Device) policies, more IoTs, and cheaper and larger USB flash drives. This teaching case uses the 2009 Stuxnet attack on Iran’s nuclear facilities to exemplify how a single USB drive was used as an endpoint threat to disrupt a nuclear infrastructure, drawing attention to the need for and how to practice DiD to counter towering complexities ushered in burgeoning endpoints cyberattacks, from hacks to ransomware. The case shows the need for DiD to simultaneously pay heed toward physical, technical, and processual (administrative) measures to prevent, defend, and mitigate cyberattacks, from hacks to ransomware. The case and its teaching notes highlight the opportunities and challenges of practicing DiD for endpoints, from flash drives to IoTs.
一个u盘破坏了核项目吗?纵深防御(DiD)教学案例
纵深防御(DiD)已经成为一个行业流行语。但是实践DiD说起来容易做起来难。虽然网络安全研究人员主要关注企业网络的安全,但在端点威胁意识方面仍然存在严重差距。然而,端点威胁是2019年68%的违规和黑客攻击的根源(全美计算机协会,2022年),在COVID-19封锁期间,随着BYOD(自带设备)政策的放松、物联网的增加以及更便宜、更大的USB闪存驱动器,这一漏洞有所增加。本教学案例使用2009年对伊朗核设施的Stuxnet攻击来举例说明如何使用单个USB驱动器作为端点威胁来破坏核基础设施,引起人们对需要以及如何实践DiD的关注,以应对新兴端点网络攻击带来的巨大复杂性,从黑客到勒索软件。该案例表明,DiD需要同时关注物理、技术和流程(管理)措施,以预防、防御和减轻网络攻击,从黑客攻击到勒索软件。案例及其教学笔记强调了在终端(从闪存驱动器到物联网)实践DiD的机遇和挑战。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
Journal of Information Technology Teaching Cases
Journal of Information Technology Teaching Cases Social Sciences-Library and Information Sciences
CiteScore
2.30
自引率
0.00%
发文量
29
期刊介绍: The Journal of Information Technology Teaching Cases (JITTC) provides contemporary practical case materials for teaching topics in business and government about uses and effectiveness of technology, the organisation and management of information systems and the impacts and consequences of information technology. JITTC is designed to assist academics, scholars, and teachers in universities and other institutions of executive education, as well as instructors of organizational training courses. Case topics include but are not restricted to: alignment with the organization, innovative uses of technology, emerging technologies, the management of IT, including strategy, business models, change, infrastructure, organization, human resources, sourcing, system development and implementation, communications, technology developments, technology impacts and outcomes, technology futures, national policies and standards.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信