Cybersecurity attack on water utility SCADA system

Assignment Help Basic Computer Science
Reference no: EM132371675

This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility's SCADA system. It occurs during the fall after a dry summer in Fringe City. The water utility's Information Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high-lift pumps. The operator's familiarity with the SCADA system allows him to reprogram the alarms that typically notify operators of a high-lift pump failure. In addition, he prevents access to the SCADA system by others. A wildfire breaks out on the outskirts of the city. Please identify what type(s) of new countermeasures should have been implemented to prevent this cyber attack from occurring.

Discuss what type(s) of new countermeasures should have been implemented to prevent the cyber attack described above from occurring. Be specific in recommending countermeasures for this scenario

 

 

Reference no: EM132371675

Questions Cloud

Management steps is to develop metrics and measure results : In order to have a successful IG program, one of the eight (8) Information Risk Planning and Management steps is to develop metrics and measure results.
Comparing categories and distributions of quantities values : Categorical: Comparing categories and distributions of quantities values. Relational: Graphing relationships to explore correlations and connections
Describe methods of network security assessment : Describe methods of a network security assessment. Why is a post-mortem assessment review important? What is the purpose of penetration testing?
Three different common risk profile methodologies : The text names off three different common risk profile methodologies. Compare and contrast each of the three and use one scholarly resource to support each.
Cybersecurity attack on water utility SCADA system : This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility's SCADA system.
Dimensionality reduction is the process of converting data : Dimensionality reduction is the process of converting data of very high dimensionality (many attributes) into data of much lower dimensionality
Operating in operational excellence : Select a thriving organization in your city or town that is operating in operational excellence, How is the operations function organized for this company?
Service reduces risk for commercial enterprises : How business process as a service (BPaaS) reduces risk for commercial enterprises.
Organ leader and decision making : Discuss the key decision criteria that IT managers need to examine to help them make IT sourcing decision. Discuss IT Budgeting practices that deliver Value

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Array of floating-point numbers

Number Array Class Design a class that has an array of floating-point numbers. The constructor should accept an integer argument.

  Determining the linear regression

As mentioned in class, a perceptron without a step or sigmoid threshold is simply a linear function, and therefore the learning is the same as linear regression

  Monetary and fiscal policies adopted by global leaders

How can the monetary and fiscal policies adopted by global leaders (i.e. government public policy & central bank actions globally) directly impact firm.

  Write a method called alarm that prints the string alarm!

The method should accept an integer parameter that specifies how many times the string is printed. Print an error message if the parameter is less than 1.

  Developed and executed the most effective strategic plan

Which CEO-Jobs or Cook-do you think developed and executed the most effective strategic plan? What evidence can you find to support your opinion?

  Determine the record lengths (m) for the bartlett

Determine the record lengths (M) for the Bartlett, Welch (50% overlap), and Blackman-Tukey methods.

  Business strategy gme

Does anyone know how the BSG (Business strategy gme) work? Like, have you done it before? Is it hard? Would you be able to help me make the decisions?

  Where do you see future of information technology heading

Where do you see the future of Information Technology heading? Why did you select to pursue a program at Our University instead of other institutions?

  Challenges are you running into as you persuasive speech

What challenges are you running into as you persuasive speech? How is it going overall? Have you worked with PowerPoint before?

  Health maintenance organization

Some people are prone to see dentist unnecessarily for minor complaints, and health maintenance organization do not know how urgently

  Two phase commit protocol in a distributed environment

When using Two Phase Commit Protocol in a distributed environment, a participant received a "prepare to commit"

  Access is an example of a relational dbms

Explain what this means, discuss how this fact impacts both the database designer and the database user, and compare it to a flat-file DBMS.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd