3

1. Chapter 6 from Textbook: Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier.

1Q. This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility’s SCADA system. It occurs during the fall after a dry summer in Fringe City.

Scenario:

The water utility’s Information Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high-lift pumps. The operator’s familiarity with the SCADA system allows him to reprogram the alarms that typically notify operators of a high-lift pump failure. In addition, he prevents access to the SCADA system by others. A wildfire breaks out on the outskirts of the city.

Task: Please identify what type(s) of new countermeasures should have been implemented to prevent this cyber-attack from occurring. Be specific in recommending countermeasures for this scenario.

1 page (Title page, Abstract, Body (in-text citations), Conclusion and References (3 min))

2. Chapters 4&5 from Text book: Information Governance: Concepts, Strategies and Best Practices; 1st Edition; Robert F. Smallwood; Copyright © 2014 by John Wiley & Sons, Inc., Hoboken, New Jersey (ISBN 978-1-118-21830-3) and Read https://community.aiim.org/blogs/robert-smallwood/2015/02/17/information-governance-success-10-ig-principles

2Q. The text names off three different common risk profile methodologies. Compare and contrast each of the three and use one scholarly resource to support each. – 1 page

Example:

Risk Profile 1, Scholarly Source 1

Risk Profile 2, Scholarly Source 2

Risk Profile 3, Scholarly Source 3

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now