Reference no: EM131371022 , Length: 4
Read the Infosecurity magazine article "Using Information Security to Protect Critical National Infrastructure: Energy Sector is Hackers' Biggest Target", located at
https://www.infosecurity-magazine.com/view/2310/using-information-security-to-protect-critical-national-infrastructure-energy-sector-is-hackers-biggest-target-/.
Write a two to four (2-4) page paper in which you:
Explain in your own words the information security concerns that exist in protecting the United States' national infrastructure.
Describe why the author of the article says that oil and gas industries are prime targets for cyber criminals more than other infrastructures and state whether or not you agree and why.
Conclude why there is a need to regulate SCADA and industrial control systems and why there is concern that this is not being dealt with appropriately.
Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.
The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Explain the national infrastructure plan in the context of strategic targets.
Use technology and information resources to research issues in homeland security.
Write clearly and concisely about topics related to Homeland Security Organization and Administration using proper writing mechanics and technical style conventions.
Justify the courts decision to neglect this as a case
: Describe how the security guards and Denny's management should have handled the situation. Explain why the security guards' daytime occupation influenced the decision in the case.Justify the court's decision to neglect this as a case of discriminatio..
|
Should the process be stopped and corrected
: The lifetime of each bulb is recorded. The data are (in hours of continuous use) 738, 752, 710, 701, 689, 779, 650, 541, 902, 700, 488, 555, 870, 609, 745, 712, 881, 599, 659, 793. Should the process be stopped and corrected? Explain why or why no..
|
Which then trickles down to employees
: Others believe fraud is based on poor leadership from top managers, which then trickles down to employees. Which argument do you agree with? Provide at least 3 examples in support of your view.
|
What is the appropriate length of the rail dock
: Determine the appropriate length of a rail dock (in feet) given the following information. The dock needs to support a demand of 720,000 pounds/day with 3 railcar changes per day. The average railcar loaded is 46 feet long and holds on average 70,000..
|
Conclude why there is a need to regulate scada
: Explain in your own words the information security concerns that exist in protecting the United States' national infrastructure.Describe why the author of the article says that oil and gas industries are prime targets for cyber criminals more than ..
|
Compute the spearman rank correlation coefficient
: An article in Money looks at the relationship between people's investments in large-cap stocks and international stocks
|
What is reliability and how is it estimated
: What is reliability? How is it estimated?
|
What actions can ms shire take throughout the year
: ACC 700- Address Ms. Shire's questions pertaining to her partnership income. Based on the given information, what actions can Ms. Shire take throughout the year to effectively reduce her tax liability from the partnership?
|
Categorized on spectrum as moral-amoral or immoral
: The Thompson and Strickland contends that managers today can be categorized on a spectrum as moral, amoral or immoral. What is the role of the utilitarian approach to decision making in business. Define it and is it ethical and if so, in what circums..
|