Discussion about intentional cybersecurity attack

Assignment Help Management Information Sys
Reference no: EM132324320

Question: This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility's SCADA system. It occurs during the fall after a dry summer in Fringe City.

Scenario: The water utility's Information Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high-lift pumps. The operator's familiarity with the SCADA system allows him to reprogram the alarms that typically notify operators of a high-lift pump failure. In addition, he prevents access to the SCADA system by others. A wildfire breaks out on the outskirts of the city.

Task: Please identify what type(s) of new countermeasures should have been implemented to prevent this cyber-attack from occurring.

• APA

Minimum 1 page (body)

• Title page

• Abstract

• Body (in-text citations)

• Conclusion

• References (3 min)

Reference no: EM132324320

Questions Cloud

Design an economical commuter vehicle which is road legal : University of Greenwich - Engineering Project Design & implementation: Commuter Vehicle Project. Design an economical commuter vehicle which is road legal
Define how the changes have affected humanity : Please discuss the technological changes that have been made since 2017 and how those changes have affected humanity, and how those changes have affected.
Describe the pros and cons of one method of transmission : Discuss the pros and cons of one method of transmission, such as Wireless Application Protocol. The response must be typed, single spaced, must be in times new.
What are the costs associated with the strategy : Discuss the importance of backups. What is the purpose of using RAID for continued operations? Also, what are the costs associated with this strategy?
Discussion about intentional cybersecurity attack : The water utility's Information Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high.
Prepare a draft related to your site using given details : Initial Draft - For this assignment, you're going to begin to work on your site. Based on your storyboard and client feedback (professor's comments).
Write a program to correctly import the data : STA 581 Programming Project - Write a program to correctly import the data as an .xls file and create a SAS data file, named 'weight_mult1'
Explain the importance of documentation in forensic analysis : Decide whether software-generated reports assist with this specific portion of the report writing process and provide a rationale for your response.
How the information could potentially be used as evidence : Describe the information that can be discovered in email headers and determine how this information could potentially be used as evidence in the investigation.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Compare and contrast sdlc and 2 other development models

When looking at the life span for the development of an application or system from the initial idea proposal through final deployment, there are several phases to accomplish. Several models examine the required phases along with tools to support e..

  Describe the reasons for disney''s adoption of itil

Discuss the type of challenges a large organization such as Disney likely encountered during the ITIL implementation. How can these challenges be overcome?

  What kinds of information database system collect

Why it is necessary to use database system - What kinds of information database system collect? and what information it provides and which database management system is used? Access?

  Brief history of the credential and credentialing body

Provide a brief history of the credential and credentialing body. Explain the purpose of the certification and the certification audience

  Discuss the need to monitor expenses related to the response

Discuss the need to monitor expenses related to the response, continuity and recovery to an incident. How is this need best accomplished? How would it be different under the Incident Command System?

  Determine the user interface which is the most efficient

From the second e-Activity, examine the ease of use and the pros and cons of three (3) types of user interfaces available to the user today. Determine the user interface which is the most efficient and user friendly. Provide a rationale for your r..

  Search for information on system and equipment failure

Search for information on system and equipment failure on your favorite search engine? List what might be done to provide fault tolerance for a single system?

  Develop a matrix using the formula as part of your example

What explanation would you give so that your staff understands that formula? Provide an example of how to use the formula. Develop a matrix using the formula as part of your example.

  Assess expected cost savings in hardware infrastructure

Cloud technology and virtualization are believed to provide business insights without enormous infrastructure enhancements.

  Specify separate recommended decisions for software design

Detailed design process and design specifications: Specify separate recommended decisions for software design, hardware, and networks. Include resolution of HCI considerations.

  Briefly describe the office of management and budget

Examine two (2) major mistakes The Office of Management and Budget made with cryptographic software.

  Use social media in stakeholder management

Recommend ways to use social media in stakeholder management. This can include social media features in software such as chatter in salesforce or the ability to +1 in Google groups when used as intranets

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd