Natural gas-energy and water are basic necessity of nation

Assignment Help Basic Computer Science
Reference no: EM132339845

Discussion -1

Natural gas, energy and water are the basic necessity of a nation or one can say it is the lifeline of the people in the country. If any of these stops functioning or gets disrupted the growth of the nation comes to a hold and even the people of that country get affected in a very negative way. In today's digital era latest technologies play a major part in the distribution on the resources like Energy, water and natural gas and this major dependency on technology has also increased the risk of cyber-attacks.

Under Energy and water division there are other sub-divisions like oil and gas, coal and power to produce energy and because of the heavily dependency on technology there often generates loopholes which are ignored. Due to this ignorance cyber attackers gain access to the system and extract information. Couple of years ago an attack was conducted on a natural gas company and because of this attack the government and the US pipeline operations had to face huge problems (Sobczak, Northey, & Behr, 2017). Cyber security is very important in every level of the hierarchy. Similarly, another attack was carried out by cyber criminals using Denial-of-Service attack. Cyberattacks overwhelm target networks with bogus traffic, making it difficult for victim computers to operate normally. Distributed-denial-of-service (DDOS) attacks harness the power of hacked "botnets" of computers to throw at hackers' targets, while rarer telephony-denial-of-service events seek to block incoming and outgoing calls (Sobczak, Northey, & Behr, 2017).

In my perception, Big or small companies should conduct frequent audits so that if there is any security gap it can be identified and fixed before it is too late. The problem with such companies is that they don't report such attacks unless it becomes too serious and by that time most of the damage is already done. In this case I think there should be strict law or policies to dictate what should an organization do in case of cyber-attack and make reporting compulsory. Secondly, there should be diversity in the team so that there will be diversity in thinking to overcome the diverse source of threats (Barker, 2018). Diversity in the team plays a very important role to over come security issues this is because diversity provides people from different country, age and gender, and because of this thinking ability and approach to cyber security will be different for every individual. This will challenge the cyber criminals because these criminals are not restricted to a particular nation, age or gender and hence a diversity in a team will help fight against these cyber criminals.


References

Sobczak, B., Northey, H., & Behr, P. (2017, May 23) Cyber raises threat against America's energy backbone. Retrieved https://www.eenews.net/stories/1060054924

Barker, J. (2018, February 05) THE INNOVATION OF DIVERSITY IN CYBERSECURITY. https://digitalguardian.com/blog/innovation-diversity-cybersecurity

Discussion-2:-

From article it says power grid systems have to depend on internally connected devices where transmission of gases is less vulnerable to cyber-attacks. In maintaining of any organization or national infrastructure should be diversified where security and reliability are key attributes in information technology. Instrumentation and critical systems (I&Cs) are challenging for critical safety environment particularly in complex applications (Kharchenko, 2016). Common Cause Failures (CCF) are key problems for safety assurance (Kharchenko, 2016) because of software failure, hardware failure and other impacts from outside causes malware, intrusion, vulnerabilities in both software and hardware.
Common cause failures can be decreased by following several types of version diversities. Diversity principle is based on idea the same product/process have the same anomalies, different means different product/process have different anomalies (Kharchenko, 2016) but different will not makes difference in achieving goals where implementation and execution in different ways.

Diversity can be implemented mainly in service oriented architecture successfully; usually it consists of Operation systems, web server, application server and database (Kharchenko, 2016).

In implementing of any system comprise with hardware and software, diversity can classified, different classification of diversities human diversity - which includes different programmers, managers, designers, testers; design diversity - different algorithms, different operating systems; functional diversity - different mechanisms, logics; signal diversity - different sensed parameters, different sensor designs, equipment diversity, conceptual diversity and implementation diversity (Kharchenko, 2016).
There are different methods in assessing the diversity principle based systems like theoretical, metrical, statistical, fault injection, probabilistic and expert methods are some of the assessment methods for diversity (Kharchenko, 2016).

Reference

Kharchenko, V. (2016, October). Diversity for safety and security of embedded and cyber physical systems: Fundamentals review and industrial cases. In 2016 15th Biennial Baltic Electronics Conference (BEC) (pp. 17-26). IEEE.

Reference no: EM132339845

Questions Cloud

Geographic information systems communicating it information : Discuss how you would use the Data Visualization and Geographic Information Systems communicating IT information to other department.
Based gaming simulation for policy making : Discuss how you would combine the two concepts to create visualizations for an ABM-Based Gaming simulation for policy making
Develop business continuity plan for your organization : Develop a business continuity plan for your organization. Describe the basic activities that must be managed by the BCP.
Discuss the impact of production relocation to cycle : 7108IBA Supply Chain Modeling Assignment, Griffith University, Australia. Discuss the impact of production relocation to cycle and safety stocks
Natural gas-energy and water are basic necessity of nation : Natural gas, energy and water are the basic necessity of a nation or one can say it is the lifeline of the people in the country.
Real-world exercises : Graded Assignments may be found at the end of each chapter of the required textbook under the title "Real-World Exercises".
Aware of to maintain good regulatory compliance : What a dba must be aware of to maintain good regulatory compliance when moving to the cloud.
Records and setting information to online pharmacies : You have been assigned to investigate whether or not employee at local hospital has been accessing patient records and setting information to online pharmacies
Find the discrepancies among reports between invoice : To perform a compare and contrast for the invoices between the 3 categories listed below using VLookup and other formulas.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Want to confirm and verify prior to notifying users

The database administrator for your company. Your staff just informed you that they have noticed several unauthorized attempts to access the database. You are trying to decide how to address this issue to your management team. What type of informatio..

  Imports and the marginal tax rate

Then calculate the revised slope of the AE curve and the multiplier when you know that the imports and the marginal tax rate will reduce the slope

  Assignment on menu selection

Despite being a fairly old technology, menu-driven interfaces are very common in user interface design.  Menu-driven interfaces consist of a series of screens which are navigated by choosing options from lists.

  How analysts compute cost of information system

When the analysts compute the cost of an information system, they seldome include the cost of the employee laybor for using that system.

  Develop business-it strategies

What planning methods would you use to develop business/ IT strategies and applications for your own business? Explain your choices.

  Find the probability that the patron will have to wait

When a patron at the restaurant for dinner, find the probability that the patron will have to wait between 15 and 22 minutes.

  Write paper on information technology job

Write paper on information technology job

  How can goodwill differentiate itself from the competition

How should the introduction of for-profit thrifts affect Goodwill's decisions about the role of customer service?

  What is the efficient number of boats to fish on river

What is the efficient number of boats to fish on this river? If each fisherman maximizes his own profit, how many fishermen will fish in the river?

  Distinguish between the four basic financial statements

Distinguish between the four basic financial statements: income statement, balance sheet, statement of stockholder's equity and cash flow statement.

  Determining the horticulture commission

The state of Louisiana has a "Horticulture Commission," the purpose of which is "to license and/or permit, and regulate persons engaged in horticultural busines

  Write a program that contains both a main function

Write a program that contains both a main function and a function called swap. Your main program should read in two integer values from the keyboard

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd