What plc-scada system was attacked

Assignment Help Computer Engineering
Reference no: EM133686191

Homework: Computer Science

This homework we are going to investigate the more devious side of things. Based on your work from ISSC477 and the MITRE ATT&CK for ICS paper, you will be describing how someone can successfully attack and/or hack a PLC.

Guidelines

Step I: Read the MITRE ATT&CK for ICS paper.

Step II: You will chose either one of the attacks listed on the webpage or if you are adventurous you can find a PLC attack of your own. Your focus on your research and data gathering should be focused on what happened in the PLC/SCADA attack. A 4 to 5 pages paper should be sufficient to answer some of the following questions.

1) What PLC/SCADA system was attacked?
2) Which organization was targeted?
3) Who attacked the target?
4) How did the attacker gain access?
5) What was the rough timeline of the attack?

Reference no: EM133686191

Questions Cloud

What methods can be utilized to terminate offer : What are requirements for an offer? What methods can be utilized to terminate an offer. What constitutes an acceptance?
Define the lost wax method of bronze casting : Define the lost wax method of bronze casting. Explain the differences between the black-figure and the red-figure vase painting techniques.
Describe the requirements of the selected project : Identify the specific system project that would meet the need of your system analysis. Describe the requirements of the selected project.
Prominent figure in perth renewable energy sector : Ava Green, a prominent figure in Perth's renewable energy sector, is on the brink of a breakthrough in solar panel technology.
What plc-scada system was attacked : What PLC/SCADA system was attacked? Which organization was targeted? Who attacked the target? How did attacker gain access? What was rough timeline of attack?
What tools are being used to go after the computer systems : Which APTs are currently going after other companies in your sector? What tools are being used to go after the computer systems?
Difference in how boeing and airbus have approached planning : What seems to be the difference in how Boeing and Airbus have approached planning? Which of the two would you invest your money in and why?
Expressly grant joey and chandler the right to privacy : Do you agree/disagree with Mr. Treeger's statements and why? Does the U.S. Constitution expressly grant Joey and Chandler the right to privacy
Describe the values that drive the decisions : Create a table that includes at least five differences in common actions taken by leaders. Describe the values that drive these decisions.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Display the date and a message

Write a Java console application that reads a string from the keyboard and tests whether it contains a valid date.

  Prepare a detailed system documentation report

Prepare a detailed system documentation report to cover your work done in steps 1 and 2 above, using a standard template.

  Write a recursive function that reverses the elements

Write a recursive function that reverses the elements in an array, where the array, indices of the first and the last value in the array are given as parameters

  How many times per day given is scanning the network

You are currently working in a research wing for a standard SOC (Security Operations Center). The SOC keeps analytics on the current trends within the network.

  How does the mqtt server authenticate clients

How does the MQTT server authenticate clients? What are the vulnerabilities of the authentication method?

  Adaptive emergency first intelligent scheduling algorithm

Prepare python code for An Adaptive Emergency First Intelligent Scheduling Algorithm for Efficient Task Management and Scheduling in Hybrid of Hard Real-Time

  Describe an example of a very poorly implemented database

Describe an example of a very poorly implemented database that you've encountered (or read about) that illustrates the potential for really messing things up.

  Was not implemented properly so the policy failed

ISS 240 University of Maine, Augusta discuss a policy you may be familiar with that falls into one of the categories

  What are the two methods of connecting to a cisco router

What are the two methods of connecting to a Cisco router for administrative purposes, maintenance, configuration, and so on?

  Some of the important features of these programs

Research and explain web page development application software from various software companies.

  What causes some operating systems to gain in popularity

What conclusions can be drawn about the evolution of operating systems? What causes some operating systems to gain in popularity and others to fade?

  Bcnf and demonstrate how you will fix it

Find out or create an example of a violation of a normal form that you would allow, tell why you are allowing the violation and explain how you would protect against anomalies.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd