Assignment and Discussions

cis 359

Question Description

Case Study 1: Stuxnet and U.S. Incident Response
Due Week 3 and worth 100 points

Read the article titled “When Stuxnet Hit the Homeland: Government Response to the Rescue,” from ABC News, located at and consider this threat in terms of incident response and recovery procedures.

Write a three to four (3-4) page paper in which you:

Explain the role of US-CERT in protecting the nation’s industrial systems and analyze its efforts in relation to preparedness and incident and recovery management.
Discuss the efforts of ICS-CERT specifically to the Stuxnet threat and examine its incident response efforts to mitigate this risk against U.S. industrial systems.
With the sophistication of the primary sites of industrial system implementations, determine whether or not alternate sites (e.g., hot site) are feasible for organizations that utilize ICS technologies. Provide a rationale.
Explain the high-level planning needed for an industrial systems organization that utilizes ICS technologies to prepare for attacks from cyber threats such as Stuxnet.
Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Summarize the various types of disasters, response and recovery methods.
Describe detection and decision-making capabilities in incident response.
Use technology and information resources to research issues in disaster recovery.
Write clearly and concisely about disaster recovery topics using proper writing mechanics and technical style conventions.

Discussion 1

"To IDS or to Not IDS?" Please respond to the following:

Suppose you were proposing the implementation of an IDS to your manager as a new initiative for your organization. Explain how you would make a business case for obtaining the funds in order to fully implement this initiative.
Propose the top three reasons for why organizations would NOT choose to implement IDS / IPS systems, and analyze each of these reasons to determine whether you believe they are valid concerns or improper conclusions.

Discussion 2

"IDS in the Cloud" Please respond to the following:

From the e-Activities, explain whether or not you believe technologies such as IDS are still relevant and useful as there is a push toward SaaS and cloud-based solutions..
Discuss from your perspective how cloud-based services change incident response, for better or worse, and determine what you believe to be the greatest preparedness concern with cloud-based services.

Final Answer


Discussion 1: To IDS or Not IDS?
The business case for obtaining funds to implement the same
IDS monitors computer systems and their networks to detect malicious activity in
the same. As such, they help to identify malicious activities for corrective measures to be taken
before threats become extreme and too expensive to handle. The invention makes any system
more secure and makes a recovery and mitigation process cheaper, which are long term financial
gains despite high initial costs (Karampidis & Papadourakis, 2017).
Why organizations would not implement IDS
The primary factors that would limit the implementation of IDS would be the high
initial cost of implementation, the shift to cloud computing might render IDSs irrelevant, the
additional costs of skill sets needed to effectively run the IDS and the fact that there are very few
IDS that actually offer additional mitigation measures in the case of an attack. These factors,
although reasonable, make companies vulnerable to attacks based on the increasing shapeshifting malware in the cyber world that would result in long-term detrimental effects if
monitoring technologies like IDS are not implemented, at least, until cloud computing becomes a
norm in the world which will take decades (Karampidis & Papadourakis, 2017).

Journal with 2 authors
Karampidis, K., & Papadourakis, G. (2017). File Type Identification - Computational
Intelligence for Digital Forensics. The Journal Of Digital Forensics, Security And Law.
doi: 10.15394/jdfsl.2017.1472

Discussion 2: IDS and the Cloud
Why IDS are still relevant despite the push towards cloud computing
Cloud computing has only been applied in very few companies. The apparent
reliance of intranet-based computer solutions in most parts of the world still makes IDS relevant
and necessary in many situations.
The challenge with cloud-based computing
Since network runners are not in control of the systems, it is the responsibility of
secondary regulatory institutions and a third party to monitor cloud systems. Th...

smithwiliams (16379)
Boston College

Top quality work from this tutor! I’ll be back!

Just what I needed… fantastic!

Use Studypool every time I am stuck with an assignment I need guidance.

Similar Questions
Related Tags

Brown University

1271 Tutors

California Institute of Technology

2131 Tutors

Carnegie Mellon University

982 Tutors

Columbia University

1256 Tutors

Dartmouth University

2113 Tutors

Emory University

2279 Tutors

Harvard University

599 Tutors

Massachusetts Institute of Technology

2319 Tutors

New York University

1645 Tutors

Notre Dam University

1911 Tutors

Oklahoma University

2122 Tutors

Pennsylvania State University

932 Tutors

Princeton University

1211 Tutors

Stanford University

983 Tutors

University of California

1282 Tutors

Oxford University

123 Tutors

Yale University

2325 Tutors