Homework-06

Q1. Once again, let us look at the electric power companies. Use web resources to find the importance of intrusion detection and prevention in these systems for continued availability. Mention any specific IDS/IPS products being used/recommended for this industry.  Comment whether or not these are these are in line with what we discussed in the…

Homework-05

Q1. Once again, let us look at the electric power companies. Use web resources to find incident reporting requirements for cyber-attacks in this sector.  Comment whether or not these are in line with what we discussed in the module. Make sure to provide a complete citation with URLs. Your answer should not exceed a page….

Homework-04

Q1. Once again, let us look at the electric power companies. Use web resources to find an information security (or cybersecurity) policy of a utility company and list some of its key features in the context of what you have learned in this module. Make sure to provide a complete citation of the source.  Your…

Homework-03

Q1. As you are aware, electric power is vital to all aspects of all life. The 2003 Northeast blackout is an example of its criticality. Use web resources and your imagination (state the assumptions) to describe the security services dimension of a desirable IA system for a power company. Q2. You have asked your system administrator to…

Homework-02

Q1. List three cases of cybercrimes committed by disgruntled employees. Use the web to find the cases and write a brief summary of when, where, and how they happened. (Provide complete citations of where you found the material.) Q2. In the context of electric (power) utilities, list three threats and corresponding vulnerabilities that they exploit…

Homework-01

Q1. List four (or more) issues addressed by Information Assurance that are often not addressed by Information Security. Q2. List four (or more) conditions that warrant methodologies for enforcing information assurance at both corporate and governmental organizations. Q3. Briefly write about the perception of information warfare and its outcomes. You may use any web resource,…