Question 1:
This defense in depth discussion scenario is an intentional cybersecurity attack on the water utility’s SCADA system. It occurs during the fall after a dry summer in Fringe City. The water utility’s Information Technology (IT) person did not receive an expected pay raise and decides to reprogram the SCADA system to shut off the high-lift pumps. The operator’s familiarity with the SCADA system allows him to reprogram the alarms that typically notify operators of a high-lift pump failure. In addition, he prevents access to the SCADA system by others. A wildfire breaks out on the outskirts of the city. Please identify what type(s) of new countermeasures should have been implemented to prevent this cyber-attack from occurring.
Start a discussion and discuss what type(s) of new countermeasures should have been implemented to prevent the cyber-attack described above from occurring. Be specific in recommending countermeasures for this scenario.
Please make sure should be 250 -300 words and non-plagiarized.
Question 2:
This assignment will be one of several throughout your PhD program that we use to help you prepare for the dissertation process. One of the core competencies necessary to succeed in a doctoral program is the ability to identify other research that pertains to your own. This means you’ll have to identify similar research, read the papers, and assimilate prior work into your own research. An annotated bibliography helps you develop and hone these research skills.
This assignment is listed on the syllabus as “Mid-term research paper” and is worth 20% of your grade. Your paper will be an annotated bibliography, specifically focusing on the “Depth” topic (i.e. Defense in Depth) in the context of protecting National Infrastructure.
Your paper must be in correct APA format, use correct grammar, and will need to include at least seven (7) resources, ALL of which must:
1) Be current. Published within the last few years.
2) Be peer-reviewed. Each sources 150 words.
3) Relate directly to Defense in depth in the context of protecting National Infrastructure.
Remember that an annotation is not the same as an abstract. Abstracts are descriptive. Your annotations are to be evaluative and critical. Give me enough information for me to decide if I’m interested enough to read the paper, and also how you perceive the paper. Don’t go skimpy on these annotations, but DO NOT write too much here. Quality is far more important that quantity. This exercise is for each of you to demonstrate that you can identify, categorize, and digest multiple research papers.
Every resource you choose must be peer reviewed. That means the paper must have undergone a formal peer review before being published in a journal or presented at a conference. You must ensure that your resources have undergone rigorous reviews. In most cases, you can find out the review process for a conference or journal by visiting the appropriate web site. Do not simply assume that a resource is peer reviewed – check it out.
Here are a few URLs with additional information: (I strongly suggest that you look at these. Really.)
https://sites.umuc.edu/library/libhow/bibliography_apa.cfm
https://www.bethel.edu/library/research/apa-annobib-sixth.pdf\
http://libguides.enc.edu/writing_basics/annotatedbib/apa <<<< Check out the “Rules! rules! rules!” section
http://guides.library.cornell.edu/annotatedbibliography
https://owl.english.purdue.edu/owl/resource/614/03/