Description
Chapter 6 - This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility’s SCADA system. It occurs during the fall after a dry summer in Fringe City. The water utility’s Information Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high-lift pumps. The operator’s familiarity with the SCADA system allows him to reprogram the alarms that typically notify operators of a high-lift pump failure. In addition, he prevents access to the SCADA system by others. A wildfire breaks out on the outskirts of the city. Please identify what type(s) of new countermeasures should have been implemented to prevent this cyber attack from occurring.
What type(s) of new countermeasures should have been implemented to prevent the cyber attack described above from occurring. Be specific in recommending countermeasures for this scenario.
You must do this following:
1) Discuss what type(s) of new countermeasures should have been implemented to prevent the cyber attack described above from occurring. Be specific in recommending countermeasures for this scenario.
2.) Mention the Pros and Cons in separate points/Paragraph
==================================================================================================
Chapter 7 - In this scenario, hackers launch cyber attacks that affect several parts of the nation’s financial infrastructure over the course of several weeks. Specifically, sensitive credit card processing facilities are hacked and numbers are released to the Internet, causing 120 million cards to be cancelled; automated teller machines (ATMs) fail nearly simultaneously across the nation; major companies report payroll checks are not being received by workers; and several large pension and mutual fund companies have computer malfunctions so severe that they are unable to operate for more than a week. Identify the countermeasures that need to be implemented to prevent these cyber attacks from occurring in the future.
What type(s) of countermeasures need to be implemented to prevent the cyber attack described above from occurring in the future. Be specific in recommending countermeasures for this scenario.
You must do this following:
1)Discuss what type(s) of countermeasures need to be implemented to prevent the cyber attack described above from occurring in the future. Be specific in recommending countermeasures for this scenario.
2.) Mention the Pros and Cons in separate points/Paragraph
References -
Amoroso, Edward G. Cyber Attacks Protecting National Infrastructure. Butterworth Heiman,
2013. ISBN: 978-0-12-391855-0
Explanation & Answer
Please let me know if there is anything needs to be changed or added. I will be also appreciated that you can let me know if there is any problem or you have not received the work. Please let me know if there is anything needs to be changed or added. I will be also appreciated that you can let me know if there is any problem or you have not received the work Good luck in your study and if you need any further help in your assignments, please let me know Can you please confirm if you have received the work? Once again, thanks for allowing me to help you R
Report: Cyber Security
Cyber Security
by HAL
General metrics
7,814
1,196
80
4 min 47 sec
9 min 12 sec
characters
words
sentences
reading
time
speaking
time
Writing Issues
No issues found
Plagiarism
This text hasn’t been checked for plagiarism
Report was generated on Friday, Mar 29, 2019, 1:01 AM
Page 1 of 3
Report: Cyber Security
Writing Issues
3
Variety
3
Word choice
3
Fluency
3
Word choice
1
Clarity
1
Passive voice misuse
2
Vocabulary
2
Word choice
Unique Words
35%
Measures vocabulary diversity by calculating the
percentage of words used only once in your
document
unique words
Rare Words
41%
Measures depth of vocabulary by identifying words
that are not among the 5,000 most common English
words.
rare words
Word Length
5.1
Measures average word length
characters per word
Report was generated on Friday, Mar 29, 2019, 1:01 AM
Page 2 of 3
Report: Cyber Security
Sentence Length
14.9
Measures average sentence length
words per sentence
Report was generated on Friday, Mar 29, 2019, 1:01 AM
Page 3 of 3
Running Head: CYBER SECURITY
1
Cyber Security
Name:
Institutional Affiliation:
Date:
2
CYBER SECURITY
Cyber Security
Chapter 6
The incident reported in this case comes from the failure of the employee to recognize the
magnitude of ...