Colonial Pipeline cyberattack
Order Instructions
For this Discussion Board, please complete the following:
Read the following article about the Colonial Pipeline cyberattack:
https://www.cnet.com/news/privacy/colonial-pipeline-ceo-tells-senate-decision-to-pay-hackers-was-made-quickly/
The Pipeline was hit by a ransomware attack (see Chapter 2, pages 86–87 in the textbook, Principles of Information Security). Around 100 gigabytes of data were stolen. Some operations had to be completely shut down due to the cyberattack. If you were the owner of Colonial Pipeline, think about how technical, administrative, and physical controls are applied in an organization to help ensure data confidentiality, integrity, and availability.
Watch the following video to review the three categories of information security controls:
Based on your review of the video, the Intellipath lesson, and the pipeline scenario, discuss the following:
Which information security control would you implement first as a disaster recovery tactic to try and prevent the problem in this scenario? Why?
In your opinion, why is each control is specifically important to ensure the security of companies such as Colonial Pipeline as a component of disaster recovery?
Word count 200-250
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.