Cybersecurity attack on water utility SCADA system

Assignment Help Basic Computer Science
Reference no: EM132748228

This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility's SCADA system. It occurs during the fall after a dry summer in Fringe City. The water utility's Information Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high-lift pumps. The operator's familiarity with the SCADA system allows him to reprogram the alarms that typically notify operators of a high-lift pump failure. In addition, he prevents access to the SCADA system by others. A wildfire breaks out on the outskirts of the city. Please identify what type(s) of new countermeasures should have been implemented to prevent this cyber attack from occurring.

Question:

Start a discussion thread and discuss what type(s) of new countermeasures should have been implemented to prevent the cyber attack described above from occurring. Be specific in recommending countermeasures for this scenario.

Reference no: EM132748228

Questions Cloud

Special risk management issues : Chapter 18 presented special risk management issues with Blue Wood Chocolates, and chapter 19 presented various financial risks at Kilgore Custom Milling.
Four steps in the k-means clustering algorithm : Discuss, in detail, the four steps in the K-means clustering algorithm.
Cloud providers that want your company business : There are many Cloud Providers that want your company's business.
What is the cloud computing reference architecture : Define cloud computing. List and briefly define three cloud service models. What is the cloud computing reference architecture?
Cybersecurity attack on water utility SCADA system : This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility's SCADA system.
Firewalls are essential to maintaining security : Firewalls are essential to maintaining security, such as supporting valid communications and blocking malicious traffic.
Privacy-Ethics and Social Responsibility : What does it mean to you when you think about your privacy rights? Should you even have an expectation of privacy in today's electronic world?
Firewalls are essential to maintaining security : Firewalls are essential to maintaining security, such as supporting valid communications and blocking malicious traffic.
What type of new countermeasures : What type(s) of new countermeasures should have been implemented to prevent the cyber attack described above from occurring.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Summarize what skills are sought by recruiters

(A) In Finance field find the most popular jobs with data scientist skills. Search jobs (especially in Seattle area) in here:

  Existing backends on the other platforms

Foxx wants you to design their new testing strategy. How should the test coverage differ from their existing backends on the other platforms?

  Establish a secure remote connection

VPNs are used to establish a secure remote connection. Examine whether they are totally secure and if not, what additional features would make them so.

  Challenge for ebay database management

Identify at least three reasons why continuing business growth has been a challenge for eBay database management

  Recognize ten different areas where software helps

In spreadsheet, recognize at least 10 different areas where software could help you, like collecting rent, performing tenant background checks, and scheduling building maintenance.

  Determine the average size of the cost matrices

Write a program for solving the assignment problem by the branch-and-bound algorithm. Experiment with your program to determine the average size of the cost matrices for which the problem is solved in a given amount of time, say, 1 minute on your ..

  Difficult decisions for a chief information officer

What do you feel are the most difficult decisions for a chief information officer (CIO)? For a chief technology officer (CTO)?

  Window a good investment

At an initial cost of $8,000 and zero salvage value, using IRR, is this window a good investment? MARR is 8%.

  What procedures would you take to fulfill the order

What procedures would you take to fulfill the order? Create a short guide to keep business going if the power is disrupted again in the future due to hurricane

  Implement floyd''s algorithm

The costs on all possible routes will be less than infinity. You should be able to enter graphs of arbitrary complexity into main().

  Corporations and high-net-worth individuals

Argue a true statement that: Globalization only significantly affects the CEO's of multinational corporations and high-net-worth individuals.

  Design for other types of testing

Usability testing is typically tightly integrated with design-for-usability or usercentered-design activities. Can you find some such integration between testing and design for other types of testing we described in this book?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd