How many ctas conduct cyber attacks on smart city projects

Assignment Help Computer Engineering
Reference no: EM133453901

Case Scenario: In this futuristic scenario, the cyber attack targets smart homes in a major city, which are connected to a centralized smart grid system. The smart homes include smart thermostats, smart security cameras, and smart locks, all connected to the internet of things (IoT). The CTAs launch a DDoS attack on the smart grid system, which leads to a massive blackout and disruption of the city's power supply. Once the smart grid system is down, the CTAs then use the IoT devices in the smart homes to launch a ransomware attack, encrypting all the data in the homes and demanding payment for its release.

Questions:

intelligence requirement (IR) - How many CTAs conduct cyber attacks on smart city projects?

Priority intelligence requirements (PIR) - Why would CTAs conduct these types of cyber attacks on smart city projects?
How might they use deception and information warfare, such as manipulation of information without the target being aware of it?
How can organizations respond such as mitigation approaches?
After this attack, what do you think CTAs may do next?

Answer these IR and PIR questions using PEST analysis to analyze the victim feature of the Diamond Model of Intrusion Analysis. Then use the defense in depth methodology to answer the IR and PIR questions by analyzing the infrastructure feature. Then for the Capabilities feature do the same thing with the Cyber Kill Chain and finally with the adversaries use both the MITRE framework and the Motive, Opportunity & Means methodology to analyze and answer.

 

 

Reference no: EM133453901

Questions Cloud

Explain how the mom framework can be applied to the amazon : Using MITRE ATT&CK, assess the current threat level of the Amazon ring attacking 2019 and style of attack. Is it High? Medium? Low? Justify your response
What is the purpose of class design : What is the purpose of Class Design? . In what ways are classes refined? . Are state machines created for every class? . What are the major components
Memories of early trauma and particularly sexual abuse : One of the major controversial topics in the field is whether or not memories of early trauma, particularly sexual abuse, are really accurate or not
Should it be state-regulated or regulated by the federal : What are some advantages and disadvantages if online gambling was to be made legal in the United States of America? Should it be state-regulated or regulated by
How many ctas conduct cyber attacks on smart city projects : Priority intelligence requirements (PIR) - Why would CTAs conduct these types of cyber attacks on smart city projects? How might they use deception
What is the lower confidence limit and upper confidence : What is the lower confidence limit and upper confidence limit for a 90% confidence interval, if estimating the population mean, give that a random sample
Develop an erd to keep track of information for : Develop an ERD to keep track of information for an educational institution. Each course is taught by one instructor, and an instructor could teach several
How this report is used by the management in decision making : Identity theft occurs when someone uses your personal information without your permission. Discuss THREE (3) techniques to protect yourself from identity theft
What is relationship of privacy to facebook business model : Perform an ethical analysis of Facebook. What is the ethical dilemma presented by this case? What is the relationship of privacy to Facebook's business model?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write code in java language and show all lines of code

Use a for loop to sum a series of integers. It must sum every fourth integer from 3 to 23. Please show all lines of code. Write code in Java language.

  Write an algorithm that accepts two strings

The algorithm should return a two dimensional array that has the information for approximate string matching.

  Explain the term multiprogramming

Explain the term multiprogramming. The following terms relate to how the operating system manages multiprogramming.

  Define the benefits of network segmentation

describe each mechanism's approach for connections establishment and termination.define the benefits of network segmentation.

  How can using other probability models and data help

How can using other probability models and data help to increase the accuracy when using subjective probability? How can you use data analytics and tools like

  Provide training or education in the internal audit

You are asked by your audit supervisor to identify national colleges or universities that provide training or education in internal audit or IT auditing area.

  Networking potentially considered the root of all cybercrime

Why is networking potentially considered the root of all cybercrime, What is security by obscurity, and why is it more dangerous than no security

  A program to count words and numbers in a plain text file

Words and numbers can be repeated. You can use any algorithm and data structures that you prefer, as long as the results are correct.

  Briefly describe the action of the examine on instruction

Briefly describe the action of the Examine OFF instruction.

  What is meant by the statistical term availability

What is the difference between mean time between failures and mean time to repair? What is meant by the statistical term availability?

  Were you able to see the given malware at both vendors

Using a web browser, perform some research on a newer malware variant that has been reported by a major malware containment vendor.

  How to designing a database for implementation

As we start designing a database for implementation should we use the latest and greatest technology? Does the user need a flat-file or object-oriented database? Give an instance of each and how it would apply to the basic database designer goo ro..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd