References


 * "http://www.qualys.com/research/knowledge/severity/." Severities KnowledgeBase**
 * N.p., n.d. Web. 2 Jun 2013. .**


 * Overseas Security and Strategic Information, Inc, . "Security Vulnerability Assessment."http://ossiinc.com/. N.p., n.d. Web. 2 Jun 2013. .**


 * Baker, George. "A Vulnerability Assessment Methodology for Critical Infrastructure Facilities."http://www.jmu.edu/. N.p., n.d. Web. 2 Jun 2013. .**


 * []**


 * "VulnerabilityAssessmentStandardsand Procedures."www.harvard.edu . Harvard University Information Technology - IT Security. Web. 2 Jun 2013. .**


 * Manky, Derek. "Top 10 vulnerabilities inside the network. "http://www.networkworld.com/. N.p., 08 Nov 2010. Web. 2 Jun 2013. .**


 * Rubens, Paul. "6 Emerging Security Threats, and How to Fight Them." http://www.esecurityplanet.com/. N.p., 25 Mar 2013. Web. 2 Jun 2013. .**


 * Rouse, Margaret . "attack vector."http://searchsecurity.techtarget.com/. N.p., Mar 2012. Web. 2 Jun 2013. .**


 * Namestnikov, Yury. "Information Security Threats in the First Quarter of 2010." http://www.securelist.com/. N.p., 01 Jun 2012. Web. 2 Jun 2013. .**


 * Falliere, Nicolas, Liam Murchu, and Eric Chien. "W32.Stuxnet Dossier." http://www.wired.com/. Symantec Corporation World Headquarters, n.d. Web. 2 Jun 2013. .**


 * Clair, Patrick, dir. Anatomy of a Computer Virus. 2012. Web. 2 Jun 2013. .**


 * Landesman, Mary. "Stuxnet Worm."http://antivirus.about.com/. N.p.. Web. 2 Jun 2013. .**


 * "Description of the Stuxnet Security Challenge." . Matrix Global Partners. Web. 2 Jun 2013. .**


 * Kumar, Sathish, and Raveej Chaubey. "Stuxne-The Formidable Cyber Weapon ."http://www.slideshare.net/. N.p.. Web. 2 Jun 2013. .**


 * "Viruses, Worms, Hoaxes,Trojans, and Security Vulnerabilities." http://www.pirainoenterprises.com/. N.p.. Web. 2 Jun 2013. .**