What type of countermeasures should have been implemented

Assignment Help Management Information Sys
Reference no: EM132240260 , Length: word count : 300

Discussion :

1) This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility's SCADA system. It occurs during the fall after a dry summer in Fringe City. The water utility's Information

Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high-lift pumps.

The operator's familiarity with the SCADA system allows him to reprogram the alarms that typically notify operators of a high-lift pump failure. In addition, he prevents access to the SCADA system by others. A wildfire breaks out on the outskirts of the city.

2) Discuss what type(s) of new countermeasures should have been implemented to prevent the cyber attack described above from occurring. Be specific in recommending countermeasures for this scenario.

Minimum of 300 words with 3 references( APA format)

Reference no: EM132240260

Questions Cloud

Write response that presents the research hypothesis : Write a 2 page response that presents the research hypothesis below and why it is important to you. Include the null hypothesis and the research hypothesis.
Discuss about the confidentiality and integrity : Select at least three security vulnerabilities that could jeopardize and compromise a database.
Create a graph or chart to analyze the data : For each issue, create a graph or chart to analyze the data you have collected. Cite at least five credible sources excluding Wikipedia, dictionaries.
Why are you inspired to possibly research in this area : Why are you inspired to possibly research in this area and/or why do you think it is important to research in this area?
What type of countermeasures should have been implemented : Discuss what type(s) of new countermeasures should have been implemented to prevent the cyber attack.
Describe what you learned from the article : A summary of what you learned from the article AND how it relates to a topic we covered that month. Your summary needs to be a minimum of five sentences.
Find at least ten pieces of spam mail from any account : Find at least ten pieces of spam mail from any account, whether it be home, work, school, or something else.
Identify one setting that would work best : Several treatment settings and treatment modalities such as outpatient, inpatient, AA, group therapy, internet therapy, etc. are identified in Week 3's.
Create an advertisement for a favorite product you have : Purpose of the advertisement. You must identify a valid purpose as if this advertisement is will be posted for the public.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Analyze the demographics of its membership

Describe two different reporting applications and one data mining application that they might develop.

  Manufacturing and service-based organization

Explain a real-life example of how departments work interdependently in both a manufacturing and service-based organization.

  How has social networking impacted e-commerce

Briefly summarize the nature of social networking. How has social networking impacted e-commerce? In what ways have small businesses used social networking to increase their exposure?

  Research any health care administration laws for your state

Research any Health care administration laws or certifications for your state and share the results.

  Need of application system like sap

Need of application system like sap - 21 century application system like SAP, Oracle, people soft or JD Edwards?

  Contrast two major erp systems from different erp software

Create a 7- to 10- slide presentation comparing and contrasting two major ERP systems from different ERP software providers.

  Examine the factors that determine the availability

Determine the measures that may be performed to minimize the activities associated with rolling-wave planning.

  Service operations queues

How are people waiting in queues in service operations similar to buffering inventories in manufacturing and in what ways are they different

  Academic computing environment

Discuss or share any problems that you faced in accessing or using the Academic Computing Environment and the Java Development Environment

  Accurate valuation of goodwill

By itself, it is valueless. Assuming that all unrelated acquisitions are at "arm's length," why is the accurate valuation of goodwill so important? Why should you be concerned about it?

  Project- protecting embedded oss on alexander rocco network

Case Project: Protecting Embedded OSs on the Alexander Rocco Network- After performing enumeration tests, you discover that the network consists of 5 systems running Windows Embedded Standard, 2 systems running Windows Server 2008 R2 for Embedded ..

  Identify multiple business pressures on xerox

Identify multiple business pressures on Xerox. Identify the role of IT as a contributor to the business technology pressures (for example, obsolescence).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd