Stuxnet: Perbedaan antara revisi
Konten dihapus Konten ditambahkan
k stuxnet |
Rescuing 1 sources and tagging 0 as dead.) #IABot (v2.0.9.2 |
||
(15 revisi perantara oleh 10 pengguna tidak ditampilkan) | |||
Baris 1:
'''Stuxnet''' merupakan [[cacing komputer]] (worm) yang diketahui keberadaannya di bulan [[Juli]] [[2010]]. [[Perangkat perusak]] ini memiliki sasaran [[peranti lunak]] [[Siemens]] dan perangkat yang berjalan dalam sistem operasi [[Microsoft Windows]].<ref>{{cite web|url=http://www.msnbc.msn.com/id/41097319/ns/us_news-the_new_york_times|publisher=msnbc.com|title=Israel tests on worm called crucial in Iran nuclear delay}}</ref>
| url=http://www.computerworld.com/s/article/print/9185419/Siemens_Stuxnet_worm_hit_industrial_systems?taxonomyName=Network+Security&taxonomyId=142
| author=Robert McMillan
Baris 6:
| accessdate=16 September 2010
| title=Siemens: Stuxnet worm hit industrial systems
| archive-date=2012-05-25
}}</ref>, dan yang pertama menyertakan [[rootkit]] ''[[Programmable logic controller|programmable logic controller (PLC)]]'' <ref>{{cite web|url=http://www.virusbtn.com/conference/vb2010/abstracts/LastMinute7.xml|title=Last-minute paper: An indepth look into Stuxnet|publisher=Virus Bulletin}}</ref><ref>{{cite news|url=http://www.bbc.co.uk/news/world-middle-east-11414483|title=Stuxnet worm hits Iran nuclear plant staff computers|publisher=BBC News | date=26 September 2010}}</ref>.▼
| archive-url=https://archive.today/20120525053210/http://www.computerworld.com/s/article/print/9185419/Siemens_Stuxnet_worm_hit_industrial_systems?taxonomyName=Network+Security&taxonomyId=142
| dead-url=yes
▲ }}</ref>
Cacing ini awalnya menyebar secara membabi buta,
Varian yang berbeda dari Stuxnet miliki target lima organisasi [[Iran]],<ref>{{cite news
|url=http://www.bbc.co.uk/news/technology-12465688
|title=Stuxnet Virus Targets and Spread Revealed
|date=15 February 2011
|accessdate=17 February 2011
|publisher=[[BBC News]]
}}</ref> kemungkinan target luas diduga adalah [[infrastruktur]] pengayaan [[uranium]] di Iran.<ref name=BBC>{{Cite news|url=http://www.bbc.co.uk/news/technology-11388018|title=Stuxnet worm 'targeted high-value Iranian assets'|publisher=[[BBC News]]|date=23 September 2010|accessdate=23 September 2010|last=Fildes|first=Jonathan}}</ref><ref>{{cite news|url=http://www.telegraph.co.uk/technology/news/8021102/Stuxnet-virus-worm-could-be-aimed-at-high-profile-Iranian-targets.html|title=Stuxnet virus: worm 'could be aimed at high-profile Iranian targets'|publisher=The Daily Telegraph|date=23 September 2010|accessdate=28 September 2010|location=London|first=Claudine|last=Beaumont}}</ref> Symantec mencatat pada [[Agustus]] [[2010]] bahwa 60% dari komputer yang terinfeksi di seluruh dunia berada di Iran.<ref>{{cite news|url=http://www.reuters.com/article/idUSLDE68N1OI20100924|work=Reuters|first=William|last=MacLean|title=UPDATE 2-Cyber attack appears to target Iran-tech firms|date=24 September 2010}}</ref> Siemens menyatakan pada [[29 November]] cacing tidak menyebabkan kerusakan pada [[pelanggan]],<ref>{{cite web |url=http://www.computerworld.com/s/article/9185419/Siemens_Stuxnet_worm_hit_industrial_systems?taxonomyId=142&pageNumber=1|title=Siemens: Stuxnet worm hit industrial systems|author=ComputerWorld|date=September 14, 2010|work=|publisher=Computerworld|accessdate=3 October 2010}}</ref> kecuali [[program nuklir Iran]], yang menggunakan peralatan [[Embargo|terembargo]] Siemens yang diperoleh secara rahasia, telah mengalami kerusakan karena Stuxnet.<ref>{{cite news|url=http://www.cbsnews.com/stories/2010/11/29/world/main7100197.shtml|work=CBS News|title=Iran Confirms Stuxnet Worm Halted Centrifuges|date=29 November 2010|access-date=2011-07-20|archive-date=2013-11-15|archive-url=https://web.archive.org/web/20131115005128/http://www.cbsnews.com/stories/2010/11/29/world/main7100197.shtml|dead-url=yes}}</ref><ref name="NYTimes20100929">{{cite web|url=http://www.nytimes.com/2010/09/30/world/middleeast/30worm.html?_r=2&pagewanted=2&hpw|title=In a Computer Worm, a Possible Biblical Clue |first1=Ethan |last1=Bronner |authorlink1=Ethan Bronner |first2=William J. |last2=Broad |authorlink2=William Broad |date=29 September 2010|publisher=[[NYTimes]]|language=English|accessdate=2 October 2010}}</ref><ref name=rsilverstein20100925>{{cite web|url=http://www.richardsilverstein.com/tikun_olam/2010/09/25/iran-confirms-stuxnet-damage-to-nuclear-facilities/ |title=Iran Confirms Stuxnet Damage to Nuclear Facilities |publisher=[[Tikun Olam (blog)|Tikun Olam]] |date=25 September 2010 |accessdate=28 September 2010}}</ref><ref>{{cite news
|url=http://economictimes.indiatimes.com/news/news-by-industry/et-cetera/Software-smart-bomb-fired-at-Iranian-nuclear-plant-Experts/articleshow/6617686.cms
|title=Software smart bomb fired at Iranian nuclear plant: Experts
|publisher=Economictimes.indiatimes.com
|date=24 September 2010
|accessdate=28 September 2010
}}</ref> Perusahaan keamanan komputer [[Rusia]] [[Kaspersky Lab]] menyimpulkan bahwa serangan canggih tersebut bisa dilakukan "dengan dukungan [[negara]]" dan telah diduga bahwa [[Israel]] dan [[Amerika Serikat]] mungkin telah terlibat.<ref>Markoff, John, "[http://www.nytimes.com/2011/02/13/science/13stuxnet.html?scp=1&sq=Malware%20Aimed%20At%20Iran%20Hit%20Five%20Sites,%20Report%20Says&st=cse Malware Aimed at Iran Hit Five Sites, Report Says]", ''[[New York Times]]'', 13 February 2011, p. 15.</ref>
== Rujukan ==
{{commonscat}}
{{reflist}}
{{komputer-stub}}▼
▲{{komputer-stub}}
|