Produce a 2500 (+/-10%) words report analysing selected case study/-ies on cyber security incidents in the Critical Infrastructure for a given industry of your choosing (such as, Water, Energy, Telecomms, Oil, Gas Electric…) Choose only one industry.
Your research should draw information from real world case studies (e.g. Stuxnet, Flame, Ukrainian Power Grid, Wannacry etc.) and relevant papers of high quality; however these should not be the sole bases of your report.
You are working as an independent consultant for a Cyber Security firm that operates a Research and Development department on Cyber Security in Industrial Control Systems. The firm wants to gather intelligence on cyber security in Critical Systems in order to come up with new products and solutions. Your assignment is to do research in this area and produce a report that addresses the firm’s needs. In particular, your research will focus on:
1. The analysis of the current threat landscape in cyber physical control systems used in the Critical Infrastructure for a given industry of you choosing.
2. The analysis and evaluation of current cyber-security approaches in the field.
3. Ways to improve current cyber security approaches, analysing their impact on the system.
4. Produce a topological map identifying the location of interventions you would apply (Section 2 and 3).
I have attached the files that you may need. Please read the (Task Specification) file,It contains useful information that you will need to write the report. Regarding the references and citations, I would like them to be Harvard-style,
The third instance is the 2015 Ukrainian Power Grid Attack, wherein a cyber-attack targeted the power grid in Ukraine, resulting in a massive blackout that affected many citizens. The incident was attributed to a Russian state-funded institution and involved malware that was designed to disrupt industrial control systems, together with those used in telecommunications (Slowik, 2019). The attackers used spear-phishing emails and malware to gain get right of entry into the networks of the energy grid operator and then used that to launch a coordinated attack that resulted in the disruption of power distribution. This incident demonstrated the capacity for cyber-assaults to disrupt important infrastructure, which includes telecommunications networks, and the want for robust security measures to protect against such threats.