Stuxnet and Covering Tracks" Please respond to the following:
Explain in your own words the necessity of a hacker concealing his / her actions in the hacking process. Determine what you believe to be, if any, the repercussions that exist for a hacker who doesn't appropriately cover his / her tracks.
Explain in your own words the processes used by the Stuxnet attackers to conceal their actions. Discuss why you believe these were successful in being undetected for such a long period of time.