Chat with us, powered by LiveChat Colonial Pipeline cyberattack - EssayAbode

Colonial Pipeline cyberattack

Order Instructions

For this Discussion Board, please complete the following:

 

Read the following article about the Colonial Pipeline cyberattack:

 

https://www.cnet.com/news/privacy/colonial-pipeline-ceo-tells-senate-decision-to-pay-hackers-was-made-quickly/

 

The Pipeline was hit by a ransomware attack (see Chapter 2, pages 86–87 in the textbook, Principles of Information Security). Around 100 gigabytes of data were stolen. Some operations had to be completely shut down due to the cyberattack. If you were the owner of Colonial Pipeline, think about how technical, administrative, and physical controls are applied in an organization to help ensure data confidentiality, integrity, and availability.

 

Watch the following video to review the three categories of information security controls:

 

 

Based on your review of the video, the Intellipath lesson, and the pipeline scenario, discuss the following:

 

Which information security control would you implement first as a disaster recovery tactic to try and prevent the problem in this scenario? Why?

In your opinion, why is each control is specifically important to ensure the security of companies such as Colonial Pipeline as a component of disaster recovery?

 

Word count 200-250

 

Related Tags

Academic APA Assignment Business Capstone College Conclusion Course Day Discussion Double Spaced Essay English Finance General Graduate History Information Justify Literature Management Market Masters Math Minimum MLA Nursing Organizational Outline Pages Paper Presentation Questions Questionnaire Reference Response Response School Subject Slides Sources Student Support Times New Roman Title Topics Word Write Writing