How many ctas conduct cyber attacks on smart city projects

Assignment Help Computer Engineering
Reference no: EM133453901

Case Scenario: In this futuristic scenario, the cyber attack targets smart homes in a major city, which are connected to a centralized smart grid system. The smart homes include smart thermostats, smart security cameras, and smart locks, all connected to the internet of things (IoT). The CTAs launch a DDoS attack on the smart grid system, which leads to a massive blackout and disruption of the city's power supply. Once the smart grid system is down, the CTAs then use the IoT devices in the smart homes to launch a ransomware attack, encrypting all the data in the homes and demanding payment for its release.

Questions:

intelligence requirement (IR) - How many CTAs conduct cyber attacks on smart city projects?

Priority intelligence requirements (PIR) - Why would CTAs conduct these types of cyber attacks on smart city projects?
How might they use deception and information warfare, such as manipulation of information without the target being aware of it?
How can organizations respond such as mitigation approaches?
After this attack, what do you think CTAs may do next?

Answer these IR and PIR questions using PEST analysis to analyze the victim feature of the Diamond Model of Intrusion Analysis. Then use the defense in depth methodology to answer the IR and PIR questions by analyzing the infrastructure feature. Then for the Capabilities feature do the same thing with the Cyber Kill Chain and finally with the adversaries use both the MITRE framework and the Motive, Opportunity & Means methodology to analyze and answer.

 

 

Reference no: EM133453901

Questions Cloud

Explain how the mom framework can be applied to the amazon : Using MITRE ATT&CK, assess the current threat level of the Amazon ring attacking 2019 and style of attack. Is it High? Medium? Low? Justify your response
What is the purpose of class design : What is the purpose of Class Design? . In what ways are classes refined? . Are state machines created for every class? . What are the major components
Memories of early trauma and particularly sexual abuse : One of the major controversial topics in the field is whether or not memories of early trauma, particularly sexual abuse, are really accurate or not
Should it be state-regulated or regulated by the federal : What are some advantages and disadvantages if online gambling was to be made legal in the United States of America? Should it be state-regulated or regulated by
How many ctas conduct cyber attacks on smart city projects : Priority intelligence requirements (PIR) - Why would CTAs conduct these types of cyber attacks on smart city projects? How might they use deception
What is the lower confidence limit and upper confidence : What is the lower confidence limit and upper confidence limit for a 90% confidence interval, if estimating the population mean, give that a random sample
Develop an erd to keep track of information for : Develop an ERD to keep track of information for an educational institution. Each course is taught by one instructor, and an instructor could teach several
How this report is used by the management in decision making : Identity theft occurs when someone uses your personal information without your permission. Discuss THREE (3) techniques to protect yourself from identity theft
What is relationship of privacy to facebook business model : Perform an ethical analysis of Facebook. What is the ethical dilemma presented by this case? What is the relationship of privacy to Facebook's business model?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd