3
1. Chapter 6 from Textbook: Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier.
1Q. This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility’s SCADA system. It occurs during the fall after a dry summer in Fringe City.
Scenario:
The water utility’s Information Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high-lift pumps. The operator’s familiarity with the SCADA system allows him to reprogram the alarms that typically notify operators of a high-lift pump failure. In addition, he prevents access to the SCADA system by others. A wildfire breaks out on the outskirts of the city.
Task: Please identify what type(s) of new countermeasures should have been implemented to prevent this cyber-attack from occurring. Be specific in recommending countermeasures for this scenario.
1 page (Title page, Abstract, Body (in-text citations), Conclusion and References (3 min))
2. Chapters 4&5 from Text book: Information Governance: Concepts, Strategies and Best Practices; 1st Edition; Robert F. Smallwood; Copyright © 2014 by John Wiley & Sons, Inc., Hoboken, New Jersey (ISBN 978-1-118-21830-3) and Read https://community.aiim.org/blogs/robert-smallwood/2015/02/17/information-governance-success-10-ig-principles
2Q. The text names off three different common risk profile methodologies. Compare and contrast each of the three and use one scholarly resource to support each. – 1 page
Example:
Risk Profile 1, Scholarly Source 1
Risk Profile 2, Scholarly Source 2
Risk Profile 3, Scholarly Source 3
Needs help with similar assignment?
We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

