Skip to main content

Explain, in your own words, based on what we have learned thus far in the course, what Stuxnet does. (Focus on Access Control, Identity, Crypto and Network security)

ITNET202A Enterprise Security Assignment 1
Due Date: 15/Oct/2018 Value: 20% Format:
Professional Report, approximately 10-12 pages long, including cover page, executive summary and table of contents.
Introduction:
Stuxnet is a malicious computer worm believed to be a jointly built American-Israeli cyber weapon.
Stuxnet specifically targets programmable logic controllers (PLCs), which allow the automation of electromechanical processes such as those used to control machinery on factory assembly lines, amusement rides, or centrifuges for separating nuclear material.
Security communities claimed the worm was developed during the Bush administration to sabotage Iran’s nuclear program with what would seem like a long series of unfortunate accidents.
Machines for Business, International (MBI) and Mensies Corporation each offered 5 Enterprise Architect/Enterprise Security Architect to implement a formal Enterprise Architecture/Enterprise Security Architecture for the nuclear research programme.
Tasks:
You are the newly appointed security specialist responsible for the security of Iranian nuclear research programme. Using your own words:
1. Explain, in your own words, based on what we have learned thus far in the course, what Stuxnet does. (Focus on Access Control, Identity, Crypto and Network security)
2. During the course, we have looked at Quantitative Risk Analysis. We have NOT covered Qualitative Risk Analysis. Imagine you are responsible for the security of Iranian nuclear research programme, research and apply Qualitative Risk Analysis on Iranian nuclear research asset.
3. Would adopting a formal Enterprise Architecture (EA) or Enterprise Security Architecture (ESA) framework such as SABSA, TOGAF, or C4ISTAR framework help the Iranian prevent attacks such as Stuxnet? Why and Why not? If it would help, which framework is suitable?
4. The regulations applied to civilian rarely applies in the international arena. The applicable laws would be UN Charter Article 2(4) and UN Charter Article 51. The Tallinn Manual may also provide guidance. But what are they? How do they apply to Iranian and Stuxnet? What options does the Iranian have to retaliate, what did they do instead?
Hints:
This is an individual assessment; you are to demonstrate to your boss that:
1. You understand what had happen
2. You understand what Qualitative Risk Analysis is and the risks of the programme
3. You understand what an Enterprise Architect/Enterprise Security Architect does. Establish your own view of whether formal EA/ESA would be useful in the case.
4. Demonstrate capacity of conducting own research of a problem related to, but not covered, in the course
 GET THIS PAPER COMPLETED FOR YOU FROM THE WRITING EXPERTS  CLICK HERE TO ORDER 100% ORIGINAL PAPERS AT PrimeWritersBay.com

Comments

Popular posts from this blog

Should pit bull terriers be banned in my community

 Discussion Forum: Counterarguments (Should pit bull terriers be banned in my community) You created a question about the topic for your W6 Rough Draft. For this discussion, you will give an answer to that question in the form of a thesis statement. "Dieting Makes People Fat" Main Post: Share your thesis statement with your classmates. Please note: As with last week’s discussion, nothing here is set in stone. Be open to changing everything about your topic, including your position and audience, as you research it and get feedback from your classmates. Topic + Position/Purpose + Supporting Points =Thesis Statement Example: Suppose the question you posed in the Week 5 discussion was something like, “Should pit bull terriers be banned in my community?” After doing some preliminary research, you have concluded that pit bulls, if raised properly, are no more dangerous than other breeds of dogs. Your thesis statement can be something like, “Pitbulls should not be banned

CYBER SECURITY and how it can impact today's healthcare system and the future

 Start by reading and following these instructions: Create your Assignment submission and be sure to cite your sources, use APA style as required, and check your spelling. Assignment: Recommendations Document Due Week 6 (100 pts) Main Assignment Recommendations Document The 1250 to 1500-word deliverable for this week is an initial draft of your recommendations. Note that this is a working document and may be modified based on insights gained in module eight and your professor's feedback. This document should contain the following elements: Summary of your problem or opportunity definition A list of possible recommendation alternatives. In this section, you are not yet at the point of suggesting the best set of recommendations but you are trying to be creative and explore all the different ways that the problem or opportunity might best be addressed. The end result here will be a list of alternatives among which you will choose your final recom

Do violent video games encourage players to become violent in real life?

 Write an outline for Speech 3, the persuasive belief speech, following the outline guidelines and formatting requirements (Do violent video games encourage players to become violent in real life?).  1000-1200 WORDS https://virtualspeech.com/blog/persuasive-speech-outline-structure-delivery Topics: https://blog.prepscholar.com/good-persuasive-speech-topics Do violent video games encourage players to become violent in real life? https://www.youtube.com/watch?v=YKKWOx43pIY WE HAVE DONE THIS ASSIGNMENT BEFORE, WE CAN ALSO DO IT FOR YOU GET SOLUTION FOR THIS ASSIGNMENT,  Get Impressive Scores in Your Class CLICK HERE TO MAKE YOUR ORDER   on Do violent video games encourage players to become violent in real life? Are You looking for Assignment and Homework Writing help?  We Provide High-Quality Academic Papers at Affordable Rates. No Plagiarism. TO BE RE-WRITTEN FROM THE SCRATCH