Find an example of a non-technical exploit like the Stuxnet worm in Iran that was used against a system. Explain how the operation was conducted or progress to achieve a given objective? When did the operation turn technical? In the case of Stuxnet, dropping malware-laden flash drives is fairly non-technical. However, a worm that seeks out a specific signature on a Siemens PLC through a network is fairly technical. Sum up the event, the main characters, objectives, and results. Was it successful? Why or why not.