Assignment:
"Stuxnet and Covering Tracks" Answer the following:
- Explain in your own words the necessity of a hacker concealing his / her actions in the hacking process. Determine what you believe to be, if any, the repercussions that exist for a hacker who doesn’t appropriately cover his / her tracks.
- Explain in your own words the processes used by the Stuxnet attackers to conceal their actions. Discuss why you believe these were successful in being undetected for such a long period of time.
Your answer must be, typed, double-spaced, Times New Roman font (size 12), one-inch margins on all sides, APA format.