This website uses cookies to ensure you have the best experience. Learn more

Computer Science Essay

1621 words - 7 pages

Student’s name
Instructor’s name
Course
Date
Stuxnet virus was created as a strategic plan to end and disable the Iranian nuclear plant that was called Busheur. It is alleged that the virus was created and spread by the governments of Israel and United States of America (Nakashima, Ellen, Greg Miller, and Julie Tate, 1). Systems that might have assisted to quickly build an Iranian nuclear bomb were effectively damaged and crippled by the nasty software. Stuxnet was first discovered in July 2010 when approximately 60% of infections were reported from Iran (Etalle, 3). While the United States and Israel did lead an aggressive international political campaign to get Iran to halt its ...view middle of the document...

According to the perspective of many technology observers and national security, the emergence of this worm is a risk that threatens or causes harms many activities that are deemed critical to the functioning of the modern society.
According to the perspective of many technology observers and national security, the emergence of this worm is a risk that threatens or causes harms many activities that are deemed critical to the functioning of the modern society (Theohary, Rollins & Paul, 1). The virus did not affect the functioning of a windows computer performance because it was designed to affect some specific models of programmable logic controllers. Some of the targeted computers were those that were made by Siemens and used in many automated systems like chemical plants, nuclear power plants, refineries and many others. If the computer that has been infected by the virus did not have a PLC software then the software did not have any effect. However if the target software was available, it would infect it. The virus also managed to access the PLCs and changed bits of some data on it. It was not easy to detect any changes in the PLCS because most of the end users did not understand the programming bit of the devices (Etalle, 10).The analysis of the virus indicated that it was very much specific in its operations which lead to the suggestion that it was specifically programmed and formulated to affect PLCs that were located in specific regions. This fact further explains that the developers had a target group (Etalle, 10).
Once the virus gained control with the Siemens PLC software, it compromised the frequency converters that the PLCs controlled. The converters regulated the speed of the motors through the alteration of the feed power.
Although the Iranian government denied that the worm had advance effects on its nuclear program, a nuclear inspectors report suggested that the reactors were not operational for about one week in November, 2010 (Theohary, Rollins & Paul, 1). This indicates that indeed the virus had great effects. There was a decrease in the operational centrifuges between 2009 and 2010 in Natanz. This is also attributed to the effects that were caused by Stuxnet virus. The government of Iran denied any damages to its developed nuclear program. However the results on the ground suggests otherwise. The pleading query is whether or not virus attack trespassed privacy and integrity.
Tehran had previously accused of its involvement in high level possession and enrichment in uranium that is supposedly utilized to create nuclear bombs. However these were mere speculation since there was no concrete evidence that was directed to making that conclusion. Due to this fact this attack is and should be considered as infringement of integrity through disabling of nuclear power plants and therefore disabling all the operations of other industries related to nuclear production in the country (chad, 2). Disabling the operations of...

Other Papers Like Computer Science

Computer Science C++ Essay

6570 words - 27 pages the eve of its new standard. by Danny Kalev Bjarne Stroustrup, inventor of the C++ programming language, is a computer scientist and the College of Engineering Chair Professor of Computer Science at Texas A&M University. He has always been highly involved in the standardization of C++. Since 2004, Bjarne and the standards committee have been busy hammering out the details of a new standard, temporarily titled C++0x. Bjarne was gracious enough

Computer Science Notes Essay

5011 words - 21 pages hypothetical computer called Java Virtual Machine the JVM has an instruction set and manipulates various memory areas at run time the compiler places the bytecode to be interpreted by the JVM into a class file THEN the JVM interprets the bytecode in the class file to execute the program there are separate class files for JVM to run, it must be able to locate the class file with the bytecode JVM uses an envio variable named CLASSPATH to help it search

College Essay for Computer Science

777 words - 4 pages It was the year 1994 when I was first introduced to a computer in school and 10 years later, i.e., 2004 I found myself pursuing Engineering program in the Aligarh Muslim University, with computer science as major. And in those 10 years, I continued getting fascinated more and more by the extensive use of computer technologies in every walk of life. The very first program I wrote in school was a simple BASIC one to calculate the factorial of a

Computer Science: The Underlying Processes

1572 words - 7 pages The list of advances made in computer science is endless and involves just about everything imaginable. In many ways, the advances that have happened over the last few decades have laid the foundation for a much more profound change in the years ahead. "Today there are about a billion PC's in use around the world". (Network World, 2008) Computers are available everywhere, in the office and the home, in our cars, in stores and restaurants. We use

Computer Science

954 words - 4 pages his account. Thus, if the bank has 1,000,000 customers, then this programmer would get $10,000 each month from this salami slicing attack. What type of malware is such a program? Question 8 There was an email joke chain letter that called itself the Amish virus. It stated that its author had no computer available in order to write it; hence, it can't run as an executable program or document macro. Instead, it asked the recipient to forward the

Computer Science

557 words - 3 pages Exercises 1. Compare the processors’ access to printers and other I/O devices for the master/slave and the symmetric multiprocessing configurations. Give a real-life example where the master/slave configuration might be preferred. 2. Compare the processors’ access to main memory for the loosely coupled configuration and the symmetric multiprocessing configurations. Give a real-life example where the symmetric configuration might be

Computer Science

684 words - 3 pages connected SQL Azure database. A data definition language or data description language (DDL) is syntax similar to a computer programming language for defining data structures especially database schemas. Schema objects do not have a one-to-one correspondence to physical files on disk that store their information. However, Oracle databases store schema objects logically within atablespace of the database. The data of each object is

Computer Science - 714 words

714 words - 3 pages Email objective | Template email | 1. Applying approval mail sent to unit manager. | Dear Unit manager,Please note that I applied for the new announced position sent from the recruitment side as my interest to have career development and I am kindly seeking your approval as mandatory to complete the applying cycle process or the request will be not eligible Many Thanks | 2. Not eligible reason. |  Dear Employee,Thank you so much for

Computer Science Siwes Report on Time and Attendance Management (Jantek)

4678 words - 19 pages KOGI STATE POLYTECHNIC SCHOOL OF APPLIED SCIENCES, MATHS/STAT/COMPUTER SCIENCE DEPARTMENT PMB 1101, LOKOJA, KOGI STATE A TECHNICAL REPORT ON STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES) AT THE TIME OFFICE, DANGOTE CEMENT PLC OBAJANA BY AIYEDE JOHN E. 2010/ND/CPS/370 IN PARTIAL Fulfillment of THE REQUIREMENT FOR THE AWARD OF NATIONAL DIPLOMA (ND) IN COMPUTER SCIENCE. FEBRUARY 2012. CHAPTER ONE

Computer Science Industrial Attachment

1081 words - 5 pages resulting information is displayed in such a pattern that is very easy to understand. Boston:McGraw-Hill Irwin,(2004). Executive information system is ‘a computer based system that serves the information that is needed by the various top executives. It provides very rapid access to the timely information and also offers the direct access to the different management reports.’ Executive Information System is very user friendly in the nature. It

Computer Science Xyz Company

1026 words - 5 pages About Organization: ABC Inc. is a leading telecom provider with a customer base of over million of users. It provides all the telephone and internet services to its customers. Management Controls Risk Management ABC Inc. is ready with the disaster recovery technique, so the risks can be handled in the organization with care and proper management; they are also maintaining a risk assessment report. Review of Security Controls They have

Related Essays

Computer Science Essay 802 Words

802 words - 4 pages COMPUTER SCIENCE PROJECT FILE ON BOOK-SHOP PROJECT PREPARED BY: SUKHJEET SINGH XII-C SESSION:2014-2015 VIVEKANAND PUBLIC SCHOOL TABLE OF CONTENT * Acknowledgement * Certificate * Introduction * Hardware and Software Requirement * Header Files & their purpose * Files Generated * Coding * Output * Bibliography ACKNOWLEDGEMENT It would be my utmost pleasure to express my sincere

Computer Science Essay 2155 Words

2155 words - 9 pages DEPARTMENT OF INFORMATION TECHNOLOGY AND DEPARTMENT OF COMPUTER SCIENCE INFT 452 / COSC 325: COMPUTER SECURITY / ENTERPRISE INFORMATION SECURITY ASSIGNMENT III STUDENT NAME: DESMOND PAA-OBENG JOHNSON JOELON ERIC STUDENT ID: 211IT02007335 211IT02007305 LECTURER: MR. EBENEZER LARYEA SUBMISSION DATE: 17TH APRIL 2014

Computer Science Essay 823 Words

823 words - 4 pages Computer Science (083) Practical File for Class XI | Index for C++ Programming | | SN. | Program Description | Topic | 1. | Write a program to play the following game:The player guesses a number from 2 to 19 and then the program generates three random numbers from 101 to 199. If the sum of the digits of any of these numbers matches the player’s number, then the player is declared a winner otherwise the player looses the game. | C

Computer Science Essay 4919 Words

4919 words - 20 pages ] Figure 7.18 [pic] 7a.7 Compound Conditions In English class, you have learned that two complete sentences can be joined together with a conjunction. In Computer Science, two conditions can be joined together with a Logic Operator. There are 4 logic operators: OR, AND, XOR, and NOT. You probably noticed that some of these are also conjunctions in English. To understand how these work, we are going to look at an example of each