Analysis Of Stuxnet And Its Impact On Iranian Nuclear Research Program

Description of Stuxnet

The Stuxnet is defined as a malicious computer worm that forms the critical issues in forming the comprehensive management factor issues for the users (Kenney, 2015). The worm targets the programmable logic control offers and attacks the working capability of the system. It hinders the process of automation of the electromechanical process resulting in factorial issues in the execution of the activities that are based for control offing the machinery activities. The operations were largely formed with the limitation of the unfortunate accidents due to the hacking of the programmable operations at Iran’s nuclear research programme (Nourian & Madnick, 2018). The requirement of the formation of the new security structure would be required for being used at the effective use of functions.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

The following assignment was developed for taking care of the analysis of the computer worm Stuxnet and its impact on the operations of the nuclear research programme of Iran. The first section would involve the influence of the computer worm and the critical formation issues in the development factors. The information management issues would be effectively dealt with the formation of the successive information management. The other factors for influence involve the significant formation of the development modes. The later section would involve the qualitative analysis of the risks of the computer worm, Stuxnet. An analysis of the possible security frameworks have also been given in the report.

Stuxnet is a typical computer worm having the extremely sophisticated actions including the exploitation of the windows function resulting in forming the critical vulnerabilities for the operating system (Karch, 2016). The worm has the capability of infecting the computers and spreading the action to the core processes of the PCs. The target centrifuges the enriched uranium production operation that is very important for the powering of the reactors and nuclear weapons. The computer worm was identified by the INFOSEC community in the year 2010. The worm has exceptional quality for spreading to the more depth range of the machinery. The worm was not developed for harming any other system that has no role in the working of the uranium enrichment (Du et al., 2016). The worm has the tendency for checking the system that is being attacked by the worm for the presence of the connection with the programmable logic circuits. The programmable logic circuits help in identifying the interaction of the system with the control of industrial machines. The worm alters the programming of programmable logic circuits and resulting in the issues in operation of the activities of the machinery. The worm has the potential of infecting the computers and spreading the action to the core processes of the PCs. The target centrifuges the enriched U production operation that’s important for the powering of the reactors and nuclear weapons. The pc worm was known by the INFOSEC community within the year 2010 (Singer, 2015). The worm has exceptional quality for spreading to the more depth vary of the machinery. The worm wasn’t developed for harming the other system that has no role within the operating of the U238 enrichment. The worm tended for checking the system that’s being attacked by the worm for the presence of reference to the programmable logic circuits. The programmable logic circuits facilitate in characteristic the interaction of the system with the management industrial machines (Wu, 2016). The worm alters the programming of programmable logic circuits and leading to the problems operating of the activities of the machinery.

Qualitative Risk Analysis of Stuxnet

Impact on machinery: Stuxnet is capable of entering the main operation processes of programmable logic circuits and forming issues in the execution of the operations (Trautman & Ormerod, 2017). The machine of uranium centrifuges would not be able to spin at the normal speed resulting in forming the critical issues for the the execution process. Stuxnet is capable of coming into the most operation processes of programmable logic circuits and forming problems in the execution of the operations. The machine of U centrifuges wouldn’t be able to spin at the conventional speed leading to forming the key problems for the the execution method.

Delay in Operation: The time boundary is another critical factor for implying the impact on the deployment of the activities and resulting in forming the critical setback issues for the operations. The operational delay would result in forming the critical operational development issues for Iran’s nuclear research organization (Edwards, 2014). The time boundary is another critical issue for implying the impact on the preparation of the activities and leading to forming the key happening problems for the operations. The operational delay would lead to forming the key operational development problems for Iran’s nuclear analysis organization.

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Economic Impact: The economic impact on the execution of the activities would be self-reliant and composed of forming the issues in operational development. The economic impact on the execution of the activities would be self-sufficient and composed of forming the problems in operational development. The economic impact on the operations of Iran’ nuclear analysis center would be declined because the problems in centrifugal operations of U.

Security Impact: The security flaws raised due to the computer worm would result in forming the issues in the execution of the research operations. The impact on the operations of the security operations would result in forming critical flaws in the security flaws. The security flaws rose because the pc worm would lead to forming the problems in the execution of the analysis operations. The impact on the operations of the safety operations would lead to forming critical flaws within the security flaws.

According to Howser & McMillin (2014), the Stuxnet may be a typical laptop worm having the very subtle actions together with the exploitation of the windows performs leading to forming the most important vulnerabilities for the OS. The worm has the aptitude of infecting the computers and spreading the action to the core processes of the PCs. The target centrifuges the enriched atomic number 92 production operation that’s important for the powering of the reactors and nuclear weapons. Stuxnet is capable of getting into the most operation processes of programmable logic circuits and forming problems in the execution of the operations (Faily & Faily, 2018). The machine of atomic number 92 centrifuges wouldn’t be ready to spin at the conventional speed leading to forming the most important problems for the the execution method. Operational delay would end in forming the most important operational development problems for Iran’s nuclear analysis organization. Kim and Lee (2015) have stated that the time boundary is another critical issue for implying the impact on the preparation of the activities and resulting in forming the key happening issues for the operations. The economic impact on the operations of Iran’ nuclear analysis center would be declined thanks to the problems in centrifugal operations of atomic number 92.

Moreover Kim & Lee (2015), have pointed out that the critical risk analysis issues for the organization was resulted in making the functional activities with the critical setback for the completion of the research operations for Uranium (U238). Stuxnet is capable of getting into the most operation processes of programmable logic circuits and forming problems in the execution of the operations. The machine of atomic number 92 centrifuges wouldn’t be ready to spin at the conventional speed leading to forming the foremost problems for the the execution method. Stuxnet is capable of coming back into the foremost operation processes of programmable logic circuits and forming issues in the execution of the operations. The machine of U centrifuges would not be ready to spin at the traditional speed resulting in forming the key issues for the the execution technique (Yannakogeorgos & Tikk, 2016). The time boundary is another critical issue for implying the impact on the preparation of the activities and leading to forming the foremost reverse problems for the operations. The operational delay would end in forming the foremost operational development problems for Iran’s nuclear analysis organization. The economic impact on the the execution of the activities would be self-sufficient and composed of forming the problems in operational development. The economic impact on the the execution of the activities would be autonomous and composed of forming the issues in operational development. The security flaws rose because the pc worm would end in forming the problems in the execution of the analysis operations (Pleinevaux, 2016). The impact on the operations of the protection operations would end in forming critical flaws within the security flaws.

The implementation of the SABSA, TOGAF, or C4ISTAR framework would help in the formation of the effective security framework for the operations of Iran’s nuclear research center. The framework would provide the following benefits to the organization,

Operation Management: Stuxnet is capable of getting into the most operation processes of programmable logic circuits and forming problems in the execution of the operations. The machine of metal centrifuges wouldn’t be able to spin at the traditional speed leading to forming the foremost problems for the execution method (Negara & Andryani, 2014). The implication of the TOGAF framework would help in managing the activities of the nuclear center. The completion of the operations would be effective with the help of the framework.

Pace of Operations: The time boundary is another critical issue for implying the impact on the readying of the activities and leading to forming the foremost blow problems for the operations. The operational delay would lead to forming the foremost operational development problems for Iran’s nuclear analysis organization (Mayer, Aubert, Grandry & Feltus, 2016). The inclusion of the TOGAF and SABSA framework would help in improving the time consumption and the development of the successive information management factors. The operations would be improved with the use of the framework for Iran’s nuclear research center.

Profit Analysis: The economic impact on the execution of the activities would be self-sufficient and composed of forming the problems in operational development (Van den Bosch, 2014). The economic impact on the execution of the activities would be independent and composed of forming the issues in operational development. The economic impact on the operations of Iran’ nuclear analysis center would be declined thanks to the issues in centrifugal operations of Uranium. The C4ISTAR model framework would enable the economic analysis of the organization and the probable factor development.

Security Improvement: the protection flaws raised thanks to the pc worm would lead to forming the problems in the execution of the analysis operations. The impact on the operations of the protection operations would lead to forming critical flaws within the security flaws. The SABSA and TOGAF framework would be helpful for attaining the security options and improved threat detection and prevention. It would help in keeping the unwanted factors aloof from the system.

The TOGAF framework is the most optimum choice for implementation in Iran’s nuclear research organization as the implementation would help in keeping the check for the computer worm and realizing the impact by the collective development. The implementation of the effective and improved operations had been helpful for taking care of the factors and aligning the modification of the successful project execution. The Stuxnet would result in forming major issues for the completion of the activities related to security management. The completion of the alignment management would allow the management of the issues and forming major setback for the innovative technology.

As stated in UN Charter Article 2(4) in the article by Moore (2015), “All members shall refrain in their international relations from the threat or use of force against the territorial integrity or political independence of any state, or in any other manner inconsistent with the purposes of the United Nations.”

As stated in UN Charter Article 51 in the article “Nothing in the present Charter shall impair the inherent right of individual or collective self-defence if an armed attack occurs against a Member of the United Nations, until the Security Council has taken measures necessary to maintain international peace and security. Measures taken by Members in the exercise of this right of self-defence shall be immediately reported to the Security Council and shall not in any way affect the authority and responsibility of the Security Council under the present Charter to take at any time such action as it deems necessary in order to maintain or restore international peace and security.”

According to the articles, the UN organizations are bounded by the fact that none of the nation would threat the other nation of the UN and if any such thing happens, the second nation has the full option for taking help of the members of UN organization for establishing peace and integrity of their nation. Strict measures would be taken for dealing with such issues and problems by the members of the UN organization. Iran can take the help of technologically advanced UN organization’s nation for forming the counter measure against the Stuxnet attack and form the integrity of their nuclear information.

Conclusion

The following assignment was developed for taking care of the analysis of the pc worm Stuxnet and its impact on the operations of the nuclear analysis programme of Iran. The Stuxnet may be outlined as a malicious laptop worm that forms the most important problems in forming the great management issue problems for the users. Associate in nursing analysis of the potential security frameworks have conjointly been given within the report. The listing of the factorial management of the quantitative risk analysis was done for ensuring the limitation of the development factors and forming the management of the successful work dependence.  The primary section was involving the influence of the pc worm and also the critical formation problems within the development factors. The worm targets the programmable logic control offers and attacks the operating capability of the system. The data management problems was be effectively prohibited the formation of the sequent information management. It hinders the method of automation of the mechanical device process leading to factorial problems in the execution of the activities that were based mostly for dominant the machinery activities. The operations were for the most part shaped with the limitation of the unfortunate accidents thanks to the hacking of the programmable operations at Iran’s nuclear analysis programme. The later section was involved the chemical analysis of the risks of the pc worm, Stuxnet. The necessity of the formation of the new security structure was needed for getting used at the effective use of functions. The opposite factors for influence involve a number of formations of the event modes. The qualitative analysis of the factors of risk was done in the assignment for implying the management of the factors and operations.

References

Army, U.S., (2017). US Army War College Information Operations Primer-Fundamentals of Information Operations-Botnet, Stuxnet, Cyber Warfare, NSA, Service Organizations.

Du, J., Zhang, J., He, T., Li, Y., Su, Y., Tie, F., Liu, M., Harte, P.J. & Zhu, A.J., (2016). Stuxnet Facilitates the Degradation of Polycomb Protein during Development. Developmental cell, 37(6), 507-519.

Dyson, T., (2014). 2 European precision strike capabilities. Precision Strike Warfare and International Intervention: Strategic, Ethico-Legal and Decisional Implications, p.33.

Edwards, C.I.P.M., (2014). An analysis of a cyberattack on a nuclear plant: The stuxnet worm. Critical Infrastructure Protection, 116.

Faily, S. & Faily, S., (2018). Case Study: Defending Critical Infrastructure Against Stuxnet. Designing Usable and Secure Software with IRIS and CAIRIS, .155-175.

Howser, G. & McMillin, B., (2014), June. A modal model of Stuxnet attacks on cyber-physical systems: A matter of trust. In Software Security and Reliability (SERE), (2014) Eighth International Conference on (225-234). IEEE.

Karch, F., (2016). Stuxnet Recruits the Proteasome to Take Down Polycomb. Developmental cell, 37(6), pp.485-486.

Kenney, M., (2015). Cyber-terrorism in a post-stuxnet world. Orbis, 59(1),111-128.

Kim, B.J. & Lee, S.W., (2015). Conceptual framework for understanding security requirements: A Preliminary study on Stuxnet. In Requirements Engineering in the Big Data Era (135-146). Springer, Berlin, Heidelberg.

Mattila, J. & Parkinson, S., (2018), May. Enterprise Architecture as a Tool in Military Change Management. In ICMLG (2018) 6th International Conference on Management Leadership and Governance (194). Academic Conferences and publishing limited.

Mayer, N., Aubert, J., Grandry, E. & Feltus, C., (2016), November. An Integrated Conceptual Model for Information System Security Risk Management and Enterprise Architecture Management Based on TOGAF. In IFIP Working Conference on The Practice of Enterprise Modeling (353-361). Springer, Cham.

Moore, A., (2015). Stuxnet & Article 2 (4)’s Prohibition against the Use of Force: Customary Law and Potential Models. Naval L. Rev, 64.

Negara, E.S. & Andryani, R., (2014). A Review: Security Framework Information Technology for University Based on Cloud Computing.

Nourian, A. & Madnick, S., (2018). A systems theoretic approach to the security threats in cyber physical systems applied to stuxnet. IEEE Transactions on Dependable and Secure Computing, 15(1), 2-13.

Pleinevaux, P., (2016), August. Towards a Metamodel for SABSA Conceptual Architecture Descriptions. In Availability, Reliability and Security (ARES), (2016) 11th Internation. IEEE.

Singer, P.W., (2015). Stuxnet and its hidden lessons on the ethics of cyberweapons. Case W. Res. J. Int’l L., 47, 79.

Trautman, L.J. & Ormerod, P., (2017). Industrial cyber vulnerabilities: Lessons from Stuxnet and the Internet of Things.

Van den Bosch, S.F., (2014). Designing Secure Enterprise Architectures A comprehensive approach: framework, method, and modelling language (Master’s thesis, University of Twente).

Wu, X., (2016). Stuxnet detected, Pc breaks down. Science China. Life Sciences, 59(11), 1202