Chap 6-7 Intentional Cybersecurity Attack SCADA system Case Analysis

User Generated

ebpxlgvz

Computer Science

Description

Chapter 6 - This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility’s SCADA system. It occurs during the fall after a dry summer in Fringe City. The water utility’s Information Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high-lift pumps. The operator’s familiarity with the SCADA system allows him to reprogram the alarms that typically notify operators of a high-lift pump failure. In addition, he prevents access to the SCADA system by others. A wildfire breaks out on the outskirts of the city. Please identify what type(s) of new countermeasures should have been implemented to prevent this cyber attack from occurring.

What type(s) of new countermeasures should have been implemented to prevent the cyber attack described above from occurring. Be specific in recommending countermeasures for this scenario.

You must do this following:

1) Discuss what type(s) of new countermeasures should have been implemented to prevent the cyber attack described above from occurring. Be specific in recommending countermeasures for this scenario.

2.) Mention the Pros and Cons in separate points/Paragraph

==================================================================================================

Chapter 7 - In this scenario, hackers launch cyber attacks that affect several parts of the nation’s financial infrastructure over the course of several weeks. Specifically, sensitive credit card processing facilities are hacked and numbers are released to the Internet, causing 120 million cards to be cancelled; automated teller machines (ATMs) fail nearly simultaneously across the nation; major companies report payroll checks are not being received by workers; and several large pension and mutual fund companies have computer malfunctions so severe that they are unable to operate for more than a week. Identify the countermeasures that need to be implemented to prevent these cyber attacks from occurring in the future.

What type(s) of countermeasures need to be implemented to prevent the cyber attack described above from occurring in the future. Be specific in recommending countermeasures for this scenario.

You must do this following:

1)Discuss what type(s) of countermeasures need to be implemented to prevent the cyber attack described above from occurring in the future. Be specific in recommending countermeasures for this scenario.

2.) Mention the Pros and Cons in separate points/Paragraph

References -

Amoroso, Edward G. Cyber Attacks Protecting National Infrastructure. Butterworth Heiman,

2013. ISBN: 978-0-12-391855-0

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Please let me know if there is anything needs to be changed or added. I will be also appreciated that you can let me know if there is any problem or you have not received the work. Please let me know if there is anything needs to be changed or added. I will be also appreciated that you can let me know if there is any problem or you have not received the work Good luck in your study and if you need any further help in your assignments, please let me know Can you please confirm if you have received the work? Once again, thanks for allowing me to help you R

Report: Cyber Security

Cyber Security
by HAL

General metrics
7,814

1,196

80

4 min 47 sec

9 min 12 sec

characters

words

sentences

reading
time

speaking
time

Writing Issues
No issues found

Plagiarism
This text hasn’t been checked for plagiarism

Report was generated on Friday, Mar 29, 2019, 1:01 AM

Page 1 of 3

Report: Cyber Security

Writing Issues
3

Variety

3

Word choice

3

Fluency

3

Word choice

1

Clarity

1

Passive voice misuse

2

Vocabulary

2

Word choice

Unique Words

35%

Measures vocabulary diversity by calculating the
percentage of words used only once in your
document

unique words

Rare Words

41%

Measures depth of vocabulary by identifying words
that are not among the 5,000 most common English
words.

rare words

Word Length

5.1

Measures average word length

characters per word

Report was generated on Friday, Mar 29, 2019, 1:01 AM

Page 2 of 3

Report: Cyber Security

Sentence Length

14.9

Measures average sentence length

words per sentence

Report was generated on Friday, Mar 29, 2019, 1:01 AM

Page 3 of 3


Running Head: CYBER SECURITY

1

Cyber Security
Name:
Institutional Affiliation:
Date:

2

CYBER SECURITY
Cyber Security
Chapter 6

The incident reported in this case comes from the failure of the employee to recognize the
magnitude of ...


Anonymous
Awesome! Perfect study aid.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags