What type of countermeasures should have been implemented

Assignment Help Management Information Sys
Reference no: EM132240260 , Length: word count : 300

Discussion :

1) This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility's SCADA system. It occurs during the fall after a dry summer in Fringe City. The water utility's Information

Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high-lift pumps.

The operator's familiarity with the SCADA system allows him to reprogram the alarms that typically notify operators of a high-lift pump failure. In addition, he prevents access to the SCADA system by others. A wildfire breaks out on the outskirts of the city.

2) Discuss what type(s) of new countermeasures should have been implemented to prevent the cyber attack described above from occurring. Be specific in recommending countermeasures for this scenario.

Minimum of 300 words with 3 references( APA format)

Reference no: EM132240260

Questions Cloud

Write response that presents the research hypothesis : Write a 2 page response that presents the research hypothesis below and why it is important to you. Include the null hypothesis and the research hypothesis.
Discuss about the confidentiality and integrity : Select at least three security vulnerabilities that could jeopardize and compromise a database.
Create a graph or chart to analyze the data : For each issue, create a graph or chart to analyze the data you have collected. Cite at least five credible sources excluding Wikipedia, dictionaries.
Why are you inspired to possibly research in this area : Why are you inspired to possibly research in this area and/or why do you think it is important to research in this area?
What type of countermeasures should have been implemented : Discuss what type(s) of new countermeasures should have been implemented to prevent the cyber attack.
Describe what you learned from the article : A summary of what you learned from the article AND how it relates to a topic we covered that month. Your summary needs to be a minimum of five sentences.
Find at least ten pieces of spam mail from any account : Find at least ten pieces of spam mail from any account, whether it be home, work, school, or something else.
Identify one setting that would work best : Several treatment settings and treatment modalities such as outpatient, inpatient, AA, group therapy, internet therapy, etc. are identified in Week 3's.
Create an advertisement for a favorite product you have : Purpose of the advertisement. You must identify a valid purpose as if this advertisement is will be posted for the public.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe the ethical issues from the anonymous hacktivist

Describe the ethical issues from the Anonymous hacktivist group taking action on several social issues

  Descriptions and justifications of the solution design

CIS8004 - Assignment. In this professional business report, Descriptions and justifications of the solution design and Technology architecture

  Select a system-software development life cycle model

Define the SDLC model and methodology and identify which SDLC step is associated with each project component.

  Describe the technical and business reasons for each choice

Describe the technical and business reasons for each choice, citing other resources as appropriate.

  Design a replication topology to copy data

Trend Works Management, or TWM, provides management consultant services nationally throughout the United States.

  What are the four key traps to avoid when scenario planning

What are the challenges which are inherent in emerging technologies that scenario planning address?

  Create a plan for a low-cost automated inventory system

Write a 4-5 page paper in which you create a plan for a low-cost automated inventory system in which you:Describe all the necessary equipment.

  How you can use operational excellence to create efficient

Describe how Operational Excellence plays a role in your organization. What tools could your organization use to be more effective at processes.

  Discuss tools that could be used to remotely monitor a

discuss tools that could be used to remotely monitor a computer with or without the computer owners awareness. you can

  What constraints did you experience

As an IT manager, discuss how you would use the materials in Chapter 11 of your textbook communicating IT information to other department.

  Discuss about an issue of constant controversy

Whether offshoring is good or bad for the people of affected countries is an issue of constant controversy. Discuss how you feel about this issue?

  What evidence do you do look at as the investigator

What would you say happened to this victim? What are some options for this scenario? What evidence do you do look at as the investigator?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd