Type of paper:Â | Essay |
Categories:Â | United States Software War World Cyber security |
Pages: | 3 |
Wordcount: | 565 words |
Introduction
The attack is reported to have been orchestrated by the United States with the help of Israel against the nuclear plans of Iran. They infiltrated the Iranian nuclear program and wanted to create a situation where the Iranians felt they could not continue with their nuclear program (Nakashima & Warrick, 2012). It was mooted as a silent and slow method of damaging the Iran nuclear program to a devastating effect.
Breach
It took several years to be detected. The malware was detected in 2010, while it was developed during the time of George Walker Bush, who had left office in 2008 (Nakashima & Warrick, 2012).
The idea began in 2006, effects began to show in 2008, and the malware was detected in 2008 (Nakashima & Warrick, 2012). This means there were about four years of working on the malware and infiltrating the Iran nuclear program.
The Extent of the Breach
At the time that the worm was discovered in 2010, coded as Olympic Games, the cyber weapon had destroyed about 1000 of the 6000 centrifuges that Iran was using to enrich uranium for making the atomic bombs (Nakashima & Warrick, 2012). This means that at about 16.7% of the program’s centrifuges.
In a case involving the United States and Israel on one side and Iran on the other side, it is always a diplomatic spat. Iran was involved in nuclear deal talks with other global powers, and this event may just have triggered their conscience to invoke pessimism in any deal that was being mooted. Iran reconsidered any concessions in the nuclear energy talks that were ongoing, forcing a hand among the other parties like the United States, North Korea, among others (Nakashima & Warrick, 2012).
Conclusion
In the attack orchestrated by the United States and Israel against the Iran nuclear program, the malware was introduced through spies and insiders. Therefore, two flaws can clearly be identified in that sense. The users and handling sensitive data were two main concerns for the institution that was handling the nuclear program. Arce et al. (2014) advised that the people who interact with the system either as end-users or in the maintenance and configuration end can make or ruin a system. Therefore, their actions must be clearly monitored. Had the Iranians monitored the people operating the system internally, the flaws may not have been introduced into their network. Sensitive data handling is vital in any system. Anything that compromises the integrity of the data must be detected and repelled early enough (Cheng et al., 2017). In such a system as the nuclear program, the introduction of any foreign data should be monitored and approved from the top. Such missing links enabled the colluders and the spies working for the United States and Israel to find their way and plant the Olympic Games into the nuclear program’s system.
References
Arce, I., Clark-Fisher, K., Daswani, N., DelGrosso, J., Dhillon, D., & Kern, C. et al. (2014). Avoiding the top 10 software security design flaws [Ebook]. IEEE Computer Society Center for Secure Design.
Cheng, L., Liu, F., & Yao, D. (2017). Enterprise data breach: causes, challenges, prevention, and future directions. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 7(5), e1211.
https://doi.org/10.1002/widm.1211
Nakashima, E., & Warrick, J. (2012). Stuxnet was work of U.S. and Israeli experts, officials say. Washington Post. Retrieved 13 August 2020, from:
https://www.washingtonpost.com/world/national-security/stuxnet-was-work-of-us-and-israeli-experts-officials-say/2012/06/01/gJQAlnEy6U_story.html?utm_term=.5836e8816a74.
Cite this page
Unveiling the Masterplan to Derail Iran's Nuclear Program - Free Paper Sample. (2023, Nov 06). Retrieved from https://speedypaper.com/essays/unveiling-the-masterplan-to-derail-irans-nuclear-program-free-paper-sample
Request Removal
If you are the original author of this essay and no longer wish to have it published on the SpeedyPaper website, please click below to request its removal:
- Research Paper Example on Technology in Education
- Latino Participation in the World War II, Essay Example for Everyone
- Free Essay Answering Why You Need to Visit London Parliament at Least Once
- American History Essay Sample: The Hispanization of Mexico
- Free Essay Looking at the American Educational System and What It Means for Future Job Readiness
- Essay Sample: Is Hoarding a Kind of Cultural Illness in the United States?
- Paper Example: Is Technology Limiting Creativity?
Popular categories