Cybersecurity attack on the water utility scada system

Assignment Help Basic Computer Science
Reference no: EM132352030

This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility's SCADA system. It occurs during the fall after a dry summer in Fringe City. The water utility's Information Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high-lift pumps. The operator's familiarity with the SCADA system allows him to reprogram the alarms that typically notify operators of a high-lift pump failure. In addition, he prevents access to the SCADA system by others. A wildfire breaks out on the outskirts of the city. Please identify what type(s) of new countermeasures should have been implemented to prevent this cyber attack from occurring.

Attachment:- Water utility SCADA system.rar

Reference no: EM132352030

Questions Cloud

What role end-users typically play in incident reporting : Discuss what role end-users typically play in incident reporting? Should end users be encouraged to report suspicious occurrences? If so, why; if not, why not.
Discuss the use of knowledge management in IT in business : Managing & Using Information Systems: A Strategic Approach, we discuss the use of knowledge management in IT in business.
Implementing enterprise change management : Implementing Enterprise Change Management at Southern Company. This is for the Implementing Enterprise Change Management at Southern Company case study
The importance of information security policy : The importance of an Information Security Policy. Explain the steps it takes to successfully implement an Information Security Policy
Cybersecurity attack on the water utility scada system : This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility's SCADA system.
Differences between business continuity-disaster recovery : What are the key differences between business continuity and disaster recovery? How are they different in a corporate environment related to planning?
Security benefits associated with maintaining PCI compliance : The security benefits associated with maintaining PCI compliance are vital to the long-term success of all merchants who process card payments.
How does supporting a cause benefit employees : How does supporting a cause benefit employees, customers, and the company's image? Discuss the emotional and psychological dimensions of customer
Level strategic advisor of a cocola comapany : Make a recommendation as to which strategies the company should use when setting up business in a new country where they are not currently known.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Value of a car is a linear function of time

Assume the value of a car is a linear function of time.  When new the car is worth $26,300; 20 years later the car is worth $1,500.  How much will the car be worth 7 years after purchase?

  What is the difference between a pretest and posttest loop

If the condition being tested in a pretest loop is false, how many times are statements in the loop executed?

  What percent of her backyard will not be watered directly

Gardening Migina bought a new sprinkler that covers part or all of a circular area. With the center of the sprinkler as the origin, the sprinkler sends out water far enough to reach a point located at (12, 16). (Lesson 10-2)

  Government give certain firms monopoly power

If monopolies are bad, why then does the government give certain firms monopoly power?

  Connect a visual basic application to a microsoft access

Provide an example of how to connect a Visual Basic application to a Microsoft Access database and then display the information in one or more controls.

  Write a program to implement the algorithm

Develop an algorithm in narrative and pseudocode or flowchart that will accept the names of all sales staff members and their total sales for the month. The algorithm must calculate the commission at 2% of their total sales amount.

  Destroy the physical components of entity quickly

Fire is one of the most devastating elements that can destroy the physical components of an entity quickly. The administrative and planning phase.

  Elements of a digital computer

What is a printed circuit board on which the CPU, RAM chips and other electronic circuit elements of a digital computer are frequently located?

  Describe risks to network security

Describe risks to network security and how they affect an organization, including the use of supporting examples

  Find the probability that the patron will have to wait

When a patron at the restaurant for dinner, find the probability that the patron will have to wait between 15 and 22 minutes.

  How the round robin scheduling algorithm works

Topic 1: Discuss how the round robin scheduling algorithm works.

  Probability that at most 10 will come to a complete stop

Suppose that only 20% of all drivers come to a complete stop at an intersection having flashing red lights in all directions when no other cars are visible.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd