Why you are focusing on the specific two security principles

Assignment Help Other Subject
Reference no: EM132357582

Assignment: Topic: Implementing Cybersecurity in the Energy Sector

Imagine you have been hired as a security consultant for EnergyA which is an electric utility company based in the USA. The company has several locations in the U.S and is responsible for supplying a large portion of electricity for the Southeastern region in the U.S.

You have been charged with overseeing the implementation of cybersecurity best practices for EnergyA. In this course, you examined 10 design and security principles in the context of national and critical infrastructure protection. Identify any two security principles and evaluate and discuss how it can be applied to EnergyA.

Your case analysis needs to minimally address the following

1. The relevance of cybersecurity in the energy sector

2. Existing research on cybersecurity practices in the energy sector

3. Why you are focusing on the specific two security principles

4. For each security principle, identify its relevance in the energy sector

5. For each security principle, identify how the principle can be implemented

6. For each security principle, identify challenges presented in implementing it

7. Discussion that connects your entire analysis with the topic and future implications of cybersecurity in the energy sector

Your research paper should be minimally 8 pages (double space, Font - Georgia with font size 12). The research paper needs cite at least 4 peer reviewed journal/book references.

The bibliography should be included as a separate page and is not part of the 8 page requirement. Student assignments will be run through Safe Assignment. Please ensure to check the safe assignment result prior to submitting.

The research paper should include the following components.

• Title Page (Not part of the minimum 8 page requirement)

• Abstract (quick overview in your own words of the entire content of your paper, limited to 200-350 words)

• Introduction (1-2 pages, relevance of cybersecurity in the energy sector)

• Literature Review (2-4 pages, describes the research papers that you find in reference to the topic of cybersecurity in the energy sector)'

• Cybersecurity Implementation (Why you are focusing on the two specific security principles; For each security principle, identify its relevance in the energy sector; For each security principle, identify how the principle can be implemented; For each security principle, identify challenges presented in implementing it)

• Discussion (2-3 pages) - (Your perspectives on the topic, try to connect the security principles identified together; discuss future implications of cybersecurity in the energy sector)

• Conclusion (1-2 paragraphs, This provides a final summary of your research paper)

• Bibliography in APA format

Textbook: Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier.

Reference no: EM132357582

Questions Cloud

Which of the following terms refers to information : Which of the following terms refers to information and feedback from others indicating that one is loved and cared for
How does the media shape the narrative : How does this topic influence culture, or been influenced by culture? How does the media shape the narrative? Do you find there is bias?
Findings on violent crimes committed by adolescents : How successful have programs been in decreasing youth violence? Describe the newer approaches aimed at decreasing delinquency and their success.
Write about the importance and purpose of Global Investments : Investments & Portfolios Assignment - Write on given topic - The importance and purpose of Global Investments.
Why you are focusing on the specific two security principles : Imagine you have been hired as a security consultant for EnergyA which is an electric utility company based in the USA. The company has several locations.
Development compare to the typical developmental patterns : How can your baby's sleeping and motor development compare to the typical developmental patterns?
Acceptable methods for collecting the data : What research design would I use to answer this question and what would be acceptable methods for collecting the data?
Example of how you would teach a vital life skill : Example of how you would teach a vital life skill, and coping skill, for an addictions client and provide an example of how you would assess effectiveness.
Analyzing information about the catcher in the rye : ENG 132-analyzing information about The Catcher in the Rye.The goal is to provide the reader with a better understanding of the novel's main character,

Reviews

Write a Review

Other Subject Questions & Answers

  What type of company should your organization acquire

A large advertising agency is working with a client who wants to gain market shares from its competitors by marketing to young professionals. The agency needs to decide whether to spend all of the marketing funds on a single form of media (intern..

  Many americans consume information

How has the Internet changed the way many Americans consume information? Explain the importance and value of the availability of information on the Internet.

  How is advocacy advanced effectively

How does a doctorally prepared advanced practice nurse advocate for patients as well as the nursing profession? Is there a symbiotic relationship.

  Describe how milgrams study illustrates social groups

The Milgram study is an example of how situational forces can impact behavior. Describe how Milgram’s study illustrates social groups, including primary and secondary groups.

  Discuss the changes made in the control mechanisms

Discuss the changes made in the control mechanisms (external and internal) in order to control the management, financing, and quality in the long-term care systems

  Explanation of the importance of research

Locate an issue in public safety, within your local community, where research could help improve a practice.

  Explain the behavioral strategies which you could implement

provide a one-page description of a stressful event currently occurring in your life. then referring to information you

  Compare and contrast your results using the three theories

Jill Jones is a bright 45-year-old woman who is the vice-president of sales in a mid-sized family owned Candy Corporation. She began her career at the company right out of high school, and over the years earned two college degrees while working h..

  How can you be an interpersonal ally

How can you be an interpersonal ally? How do you know if you are being an ally?

  Find center distance-contact ratio and resultant forces

A gear set has a pinion with 20 teeth and a gear with 40 teeth ,the pinion runs at 30 rev/s and transmit a power of 20 kw,the teeth are on the 20 full depth systems and have a module of 5 mm ,the length of line of action is 19mm find center distance,..

  Explain what are the typical modes of family communication

Explain What are the typical modes of family communication? It is affective? What cultural and religious factors influence the family health and social status?

  Assignment job analysis paper

Choose a job you would be interested in pursuing to prepare for this assignment. Write a 1,050- to 1,400-word paper in which you address the following:

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd