Implemented to prevent this cyber-attack from occurring

Assignment Help Basic Computer Science
Reference no: EM132344163

This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility's SCADA system. It occurs during the fall after a dry summer in Fringe City.

Scenario:

The water utility's Information Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high-lift pumps. The operator's familiarity with the SCADA system allows him to reprogram the alarms that typically notify operators of a high-lift pump failure. In addition, he prevents access to the SCADA system by others. A wildfire breaks out on the outskirts of the city.

Task:

Please identify what type(s) of new countermeasures should have been implemented to prevent this cyber-attack from occurring.

APA

Minimum 1 page

Title page

Abstract

Body (in-text citations)

Conclusion

References (3 min)

Discussion on the above paper:

From the Research Paper in Lesson 4 share the types of countermeasures you discovered.

This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility's SCADA system. It occurs during the fall after a dry summer in Fringe City. The water utility's Information Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high-lift pumps. The operator's familiarity with the SCADA system allows him to reprogram the alarms that typically notify operators of a high-lift pump failure. In addition, he prevents access to the SCADA system by others. A wildfire breaks out on the outskirts of the city. Please identify what type(s) of new countermeasures should have been implemented to prevent this cyber attack from occurring.

Start a discussion thread and discuss what type(s) of new countermeasures should have been implemented to prevent the cyber attack described above from occurring. Be specific in recommending countermeasures for this scenario.

You must do this following:

1. Create a new thread. As indicated above, discuss what type(s) of new countermeasures should have been implemented to prevent the cyber attack described above from occurring. Be specific in recommending countermeasures for this scenario.

Reference no: EM132344163

Questions Cloud

Code of ethics-conscious capitalism and ethical dilemma : Pick one of the following terms for your research: code of ethics, conscious capitalism, corporate social responsibility (CSR), culture, ethical dilemma
Describe the proposed training program : What do you think of this? Is it likely that hotel staff will be able to learn how to handle unhappy customers from just listening to a presentation?
Discuss scope of cloud computing audit for your business : discuss the scope of a cloud computing audit for your business.
Cloud services in your data analytics firm : Describing your approach to using Cloud services in your (imaginary) Data Analytics firm. You can choose to use Cloud services or not to use Cloud services.
Implemented to prevent this cyber-attack from occurring : identify what type(s) of new countermeasures should have been implemented to prevent this cyber-attack from occurring.
Can steganography replace the use of encryption : What are the advantages and disadvantages of using steganography? Can steganography replace the use of encryption?
Bettman must take in order to implement CRM at Minitrex : Outline the steps that Bettman must take in order to implement CRM at Minitrex. In your plan be sure to include people, processes, and technology.
What is electronic frontier foundation mission statement : What is the Electronic Frontier Foundation's mission statement? What are the legal implications of consumer privacy information being shared?
Case Study on Operational Strategy for IT Organization : You are in IT management/leadership team in a medium size IT organization and are responsible for three engineering teams.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Match the terms with their definitions

Match the terms with their definitions.... JavaFX drap/drop methods...

  Why do economists keep changing their models

Why do economists keep changing their models? It seems like they tell a story, and then some number of years later

  Various tests and examinations conducted

Associate with each patient a log of the various tests and examinations conducted.

  Using the marginal approach

Suppose your company runs a shuttle business of a hotel to and from the local airport. The costs for different customer loads are:

  Creating the processes correctly in my shell

How can I figure out which part of the code is not creating the processes correctly in my shell (written in C)?

  Goals and mission of the information security community

The roles of information security professionals are almost always aligned with the goals and mission of the information security community of interest.

  Balanced scorecard categories

In which of the following balanced scorecard categories would performance drivers be located if they are used to minimize equipment down time.

  Design the necessary preprocessing and searching algorithms

As soon as we get a mismatch in trying to match the word sought we skip to the start of the next word. To do this it is necessary to build the "skip-to-the-next-word" links into the text

  Problem first connected to its proposed solution

During which stage is a problem first connected to its proposed solution?

  Prevent a user from having access

In linux how could you automatically prevent a user from having access to any files or directories that you create?

  What is meant by an execution of a query tree

What is meant by an execution of a query tree? Discuss the rules for transformation of query trees and identify when each rule should be applied during optimization.

  Design a 4-word by 4-bit lifo stack using shift register

Draw your schematic, indicating the components used. How do you distinguish between a full stack and an empty stack in this implementation?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd