Explain in your own words the necessity of a hacker concealing his / her actions in the hacking process. Determine what you believe to be, if any, the repercussions that exist for a hacker who doesn't appropriately cover his / her tracks.
From the e-Activity, explain in your own words the processes used by the Stuxnet attackers to conceal their actions. Discuss why you believe these were successful in being undetected for such a long period of time.
eactivity
Go to the Wired Website to read the article titled "How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History," dated July 2011, located at https://www.wired.com/threatlevel/2011/07/how-digital-detectives-deciphered-stuxnet/all/1. Be prepared to discuss.