A Total Quality Management training video produced by final year MEng students at the University of Edinburgh. The aim of the video is to explain the main principles of TQM in a tongue-in-cheek style to improve the tea making process in a tea shop business.
When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its sophistication loomed a more troubling mystery: its purpose. Ralph Langner and team helped crack the code that revealed this digital warhead’s final target. In a fascinating look inside cyber-forensics, he explains how — and makes a bold (and, it turns out, correct) guess at its shocking origins.
Ralph Langner’s Stuxnet Deep Dive is the definitive technical presentation on the PLC attack portion of Stuxnet. He did a good job of showing very technical details in a readable and logical presentation that you can follow in the video if you know something about programming and PLC’s.
The main purpose of Ralph’s talk was to convince the audience with “100% certainty” that Stuxnet was designed specifically to attack the Natanz facility. He does this at least four different ways, and I have to agree there is no doubt.
Ralph Langner is a German control system security consultant. He has received worldwide recognition for his analysis of the Stuxnet malware.
Stuxnet worm hits Iranian centrifuges – from mid-2009 to late 2010
Iran complains facilities hit by Stars malware – April 2011
Duqu trojan hits Iran’s computer systems – November 2011
Flame virus targets computers in PCs across the Middle East, including Iran and Israel – June 2012