This assignment evaluates the following module learning outcomes:
In essence, this assignment entails producing a 2500 (+/-10%) word report analyzing the prevailing cyber threat landscape and cyber protection strategies in Critical Infrastructure, while proposing improvements. The report will be research-based and formatted to industry standards; you are expected to draw insights from one or more case studies such as "Stuxnet" (and/or its variants), the "Analysis of the Cyber Attack on the Ukrainian Power Grid" in 2015, and Wannacry, albeit without relying solely on these examples.
This task will aid in identifying and assessing the challenges inherent in protecting cyber-physical control systems employed in Critical Infrastructure, presented within a report adhering to industrial standards. Through research, you will evaluate the current threat landscape, existing cyber protection approaches, and recommend avenues for enhancement. For any questions related to this assignment, please engage in discussions on the Blackboard platform.
Section 2: Task Specification
Produce a 2500 (+/-10%) word report analyzing selected case studies on cyber security incidents within Critical Infrastructure, focusing on an industry of your choice (e.g., Water, Energy, Telecommunications).
Imagine yourself as an independent consultant for a Cyber Security firm with a Research and Development department focused on Industrial Control Systems Cyber Security. The firm seeks intelligence on cyber security in Critical Systems to develop new products and solutions. Your task is to conduct research in this domain and generate a report addressing the firm`s requirements. Specifically, your research should concentrate on:
Analyzing the current cyber threat landscape in cyber-physical control systems utilized in Critical Infrastructure within a chosen industry.
Evaluating current cyber security approaches prevalent in the field.
Proposing enhancements to current cyber security strategies, analyzing their impact on the system.
Creating a topological map illustrating proposed interventions (Sections 2 and 3). [A topological map template is available in the assignments folder on Blackboard, but you are free to create your own.]
Your research should draw from real-world case studies (some discussed in lectures/tutorials like Stuxnet, Flame, Ukrainian Power Grid, Wannacry, etc.) and high-quality research papers; however, these should not serve as the sole basis of your report.
Your report must clearly delineate the following elements:
The report should adhere to professional standards, written in an appropriate style and format. Attention to accuracy, completeness, and consistency in citation and source listing is imperative.
Section 3: Deliverables
Your report should encompass the findings from Section 2. The first page of your report should clearly display the title, your name, student ID, and the date.