ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 103 Weeks Ago, 2 Days Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 04 May 2017 My Price 11.00

SCADA Worm

I need help with the following assignment. Also I have included the grading rubrick for which each section should be in the paper. 

 

Case Study 2: SCADA Worm
Due Week 6 and worth 100 points

Protecting the nation’s critical infrastructure is a major security challenge within the U.S.  Likewise, the responsibility for protecting the nation’s critical infrastructure encompasses all sectors of government, including private sector cooperation. Search on the Internet for information on the SCADA Worm, such as the article located at http://www.theregister.co.uk/2010/09/22/stuxnet_worm_weapon/.

Write a three to five (3-5) page paper in which you:

  1. Describe the impact and the vulnerability of the SCADA / Stuxnet Worm on the critical infrastructure of the United States.
  2. Describe the methods to mitigate the vulnerabilities, as they relate to the seven (7) domains.
  3. Assess the levels of responsibility between government agencies and the private sector for mitigating threats and vulnerabilities to our critical infrastructure.
  4. Assess the elements of an effective IT Security Policy Framework, and how these elements, if properly implemented, could prevent or mitigate and attack similar to the SCADA / Stuxnet Worm.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Identify the role of an information systems security (ISS) policy framework in overcoming business challenges.
  • Compare and contrast the different methods, roles, responsibilities, and accountabilities of personnel, along with the governance and compliance of security policy framework.
  • Describe the different ISS policies associated with the user domain.
  • Analyze the different ISS policies associated with the IT infrastructure.
  • Use technology and information resources to research issues in security strategy and policy formation.
  • Write clearly and concisely about Information Systems Security Policy topics using proper writing mechanics and technical style conventions.

 

 

2/7/2017 https://blackboard.strayer.edu/bbcswebdav/institution/CIS/462/1128/Week6­1128/Week 6 Case Study 2 Grading Rubric.html Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing
skills, using the following rubric.
Points: 100 Case Study 2: SCADA Worm Unacceptable Meets
Minimum
Expectations Fair Proficient Exemplary Below 60% F 60­69% D 70­79% C 80­89% B 90­100% A 1. Describe the
impact and the
vulnerability of the
SCADA / Stuxnet
worm on the
critical
infrastructure of
the United States.
Weight: 20% Did not submit or
incompletely
described the
impact and the
vulnerability of
the SCADA /
Stuxnet worm on
the critical
infrastructure of
the United
States. Insufficiently
described the
impact and the
vulnerability of
the SCADA /
Stuxnet worm
on the critical
infrastructure of
the United
States. Partially
described the
impact and the
vulnerability of
the SCADA /
Stuxnet worm
on the critical
infrastructure of
the United
States. Satisfactorily
described the
impact and the
vulnerability of
the SCADA /
Stuxnet worm
on the critical
infrastructure of
the United
States. Thoroughly
described the
impact and the
vulnerability of
the SCADA /
Stuxnet worm
on the critical
infrastructure of
the United
States. 2. Describe the
methods to
mitigate the
vulnerabilities, as
they relate to the
seven (7)
domains.
Weight: 20% Did not submit or
incompletely
described the
methods to
mitigate the
vulnerabilities, as
they relate to the
seven (7)
domains. Insufficiently
described the
methods to
mitigate the
vulnerabilities,
as they relate to
the seven (7)
domains. Partially
described the
methods to
mitigate the
vulnerabilities,
as they relate to
the seven (7)
domains. Satisfactorily
described the
methods to
mitigate the
vulnerabilities,
as they relate to
the seven (7)
domains. Thoroughly
described the
methods to
mitigate the
vulnerabilities,
as they relate to
the seven (7)
domains. 3. Assess the
levels of
responsibility
between
government
agencies and the
private sector for
mitigating threats
and vulnerabilities
to our critical
infrastructure.
Weight: 20% Did not submit or
incompletely
assessed the
levels of
responsibility
between
government
agencies and the
private sector for
mitigating threats
and
vulnerabilities to
our critical
infrastructure. Insufficiently
assessed the
levels of
responsibility
between
government
agencies and
the private
sector for
mitigating
threats and
vulnerabilities
to our critical
infrastructure. Partially
assessed the
levels of
responsibility
between
government
agencies and
the private
sector for
mitigating
threats and
vulnerabilities
to our critical
infrastructure. Satisfactorily
assessed the
levels of
responsibility
between
government
agencies and
the private
sector for
mitigating
threats and
vulnerabilities
to our critical
infrastructure. Thoroughly
assessed the
levels of
responsibility
between
government
agencies and
the private
sector for
mitigating
threats and
vulnerabilities
to our critical
infrastructure. 4. Assess the
elements of an
effective IT
Security Policy
Framework, and
how these
elements, if
properly
implemented,
could prevent or
mitigate and attack
similar to the
SCADA / Stuxnet
Worm.
Weight: 25% Did not submit or
incompletely
assessed the
elements of an
effective IT
Security Policy
Framework, and
how these
elements, if
properly
implemented,
could prevent or
mitigate and
attack similar to
the SCADA /
Stuxnet Worm. Insufficiently
assessed the
elements of an
effective IT
Security Policy
Framework, and
how these
elements, if
properly
implemented,
could prevent or
mitigate and
attack similar to
the SCADA /
Stuxnet Worm. Partially
assessed the
elements of an
effective IT
Security Policy
Framework, and
how these
elements, if
properly
implemented,
could prevent or
mitigate and
attack similar to
the SCADA /
Stuxnet Worm. Satisfactorily
assessed the
elements of an
effective IT
Security Policy
Framework,
and how these
elements, if
properly
implemented,
could prevent
or mitigate and
attack similar to
the SCADA /
Stuxnet Worm. Thoroughly
assessed the
elements of an
effective IT
Security Policy
Framework,
and how these
elements, if
properly
implemented,
could prevent
or mitigate and
attack similar to
the SCADA /
Stuxnet Worm. 5. 3 references
Weight: 5% No references
provided Does not meet
the required
number of
references; all
references poor
quality choices. Does not meet
the required
number of
references;
some Meets number
of required
references; all
references high
quality choices. Exceeds
number of
required
references; all
references high
quality choices. Criteria https://blackboard.strayer.edu/bbcswebdav/institution/CIS/462/1128/Week6­1128/Week%206%20Case%20Study%202%20Grading%20Rubric.html 1/2 2/7/2017 https://blackboard.strayer.edu/bbcswebdav/institution/CIS/462/1128/Week6­1128/Week 6 Case Study 2 Grading Rubric.html references poor
quality choices.
6. Clarity, writing
mechanics, and
formatting
requirements
Weight: 10% More than 8
errors present 7­8 errors
present 5­6 errors
present 3­4 errors
present 0­2 errors
present https://blackboard.strayer.edu/bbcswebdav/institution/CIS/462/1128/Week6­1128/Week%206%20Case%20Study%202%20Grading%20Rubric.html 2/2

Attachments:

Answers

(11)
Status NEW Posted 04 May 2017 12:05 AM My Price 11.00

-----------

Attachments

file 1493857522-Solutions file 2.docx preview (51 words )
H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly -----------onl-----------ine----------- an-----------d g-----------ive----------- yo-----------u e-----------xac-----------t f-----------ile----------- an-----------d t-----------he -----------sam-----------e f-----------ile----------- is----------- al-----------so -----------sen-----------t t-----------o y-----------our----------- em-----------ail----------- th-----------at -----------is -----------reg-----------ist-----------ere-----------d o-----------n -----------THI-----------S W-----------EBS-----------ITE-----------. ----------- Th-----------ank----------- yo-----------u -----------
Not Rated(0)
Relevent Questions