What steps would you take to address this issue and why

Assignment Help Computer Engineering
Reference no: EM133520708

Question: If you were in a situation where the firmware could be upgraded on a SCADA device but the vendor refuses to fix a critical vulnerability, what steps would you take to address this issue and why? Also, do you believe that vendors should be liable for releasing vulnerable firmware, and if so, how would you hold them accountable?

Reference no: EM133520708

Questions Cloud

What is sql performance tuning : What is SQL performance tuning? What is database performance tuning? What is the focus of most performance-tuning activities, and why does that focus
Conduct research on cyber defense, offense, policy : Conduct research on cyber defense, offense, policy, or criminology, and focus on the data that is required for one or more aspects of computing in order
Why is important customer information, such as usernames : Why is important customer information, such as usernames, passwords, and web surfing history, stored in unsecured text files? What would be a better solution?
Describe briefly each of the identified risks threats : Describe briefly each of the identified risks/threats. Evaluate the security controls that mitigate each of the risks/threats identified.
What steps would you take to address this issue and why : what steps would you take to address this issue and why? Also, do you believe that vendors should be liable for releasing vulnerable firmware, and if so
Why a pentester would need to filter out certain types : provide me with an actual example of why a pentester would need to filter out certain types of information when using wireshark?
What should be included in your drp : What should be included in your DRP? Please be specific. Pretend you have been tasked to develop your company's disaster recovery plan (DRP). Your company has
Difference between an active attack and a passive attack : What is the difference between an active attack and a passive attack? Give 1 to 2 examples of both: active attack and a passive attack.
What rights should consumers have in regard to privacy : What rights should consumers have in regard to privacy of information collected about them? How should these rights be enforced

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is the url of the web site

What is the URL of the Web site? Is this page appealing or unappealing? List three reasons for your answer.

  What type of cultural identifiers have you used

What type of cultural identifiers have you used or heard others use? What impact can these identifiers have in the workplace. Provide an example.

  How would you determine the ip addresses of your devices

In your original post, answer the following about the service you have chosen: How would you determine the IP addresses of your devices on your network?

  Create a data frame that is equivalent to the sas data

Read inPrecipitation.dat using R. Submit your code, and a listing and an str() of the data frame you created. (Hint: you will need to handle the missing value correctly. Read in Traffic.dat using R and create a data frame that is equivalent to the ..

  Describe cybersecurity training programs

Describe Cybersecurity Training programs at your own organization (frequency, use of automation, certification after finishing, etc).

  Determine minimum and maximum access times for memory system

A memory system has the following characteristics access times: cache, 100 ns; main memory, 1000 ns; TLB, 40 ns; secondary storage, 3000 ns.

  Generally the overall report identifies or investigates

generally the overall report identifies or investigates issues as well as problems of itc government in context of poor

  Explain what functions does open text provide

Knowledge Management Systems And CRM. In answer to the challenges Nelnet faces in servicing a growing volume of student loans, the company chose to deploy.

  How could one improve such protocol

Considering the performance of a communincation protocol design, how may the number of messages have potentially the largerst impact as compared to the total amount of data.

  Create a microsoft powerpoint presentation on awareness

Create a 6-slide Microsoft PowerPoint presentation on Awareness. Adequate references to support your findings, information, and opinions.

  Write a c program that allows a user to extract some part

Write a C program (partcopy) that allows a user to extract some part of an existing file (fileSource) and copy it to a new file fileTarget.

  You will be developing a human elements in it strategy

you will select a real or fictitious organization and apply your research to the development of a strategy that would

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd