Order this paper now

Please reference the attached for this week’s assignment.

Please note that “threat” is used broadly to refer to either a specific type of cybercriminal, a vulnerability, or both.

Computer Crime

Cybercrime targeting Critical Infrastructure

Case Studies

 In the following real-life examples, please discuss what specific threat manifested per Holt. Then, apply a theoretical perspective to explain why each event happened. In the theory application, please ensure you note the premise of the perspective and all key components. You may type directly into this sheet or use a separate document.

Case Study One:

“Maroochy Shire Sewage Spill. In the spring of 2000, a former employee of an Australian organization that develops manufacturing software applied for a job with the local government but was rejected. Over a two-month period, the disgruntled rejected employee reportedly used a radio transmitter on as many as 46 occasions to remotely break into the controls of a sewage treatment system. He altered electronic data for particular sewerage pumping stations and caused malfunctions in their operations, ultimately releasing about 264 000 gallons of raw sewage into nearby rivers and parks.”

Case Study Two:

“Penetration Testing Incident. A natural gas utility hired an IT security consulting organization to conduct penetration testing on its corporate IT network. The consulting organization carelessly ventured into a part of the network that was directly connected to the SCADA system. The penetration test locked up the SCADA system and the utility was not able to send gas through its pipelines for four hours. The outcome was the loss of service to its customer base for those four hours.”

Case Study Three:

“Bellingham, Washington Gasoline Pipeline Failure. In June 1999, 900,000 liters (237,000 gallons) of gasoline leaked from a 16 in. (40.64 cm) pipeline and ignited 1.5 hours later causing 3 deaths, 8 injuries, and extensive property damage. The pipeline failure was exacerbated by control systems not able to perform control and monitoring functions. Immediately prior to and during the incident, the SCADA system exhibited poor performance that inhibited the pipeline controllers from seeing and reacting to the development of an abnormal pipeline operation.”

Order this paper now

Leave a Reply

Your email address will not be published. Required fields are marked *