Categories
Uncategorized

Colonial Pipeline cyberattack

The post Colonial Pipeline cyberattack is a property of College Pal
College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

Order Instructions

For this Discussion Board, please complete the following:

 

Read the following article about the Colonial Pipeline cyberattack:

 

https://www.cnet.com/news/privacy/colonial-pipeline-ceo-tells-senate-decision-to-pay-hackers-was-made-quickly/

 

The Pipeline was hit by a ransomware attack (see Chapter 2, pages 86–87 in the textbook, Principles of Information Security). Around 100 gigabytes of data were stolen. Some operations had to be completely shut down due to the cyberattack. If you were the owner of Colonial Pipeline, think about how technical, administrative, and physical controls are applied in an organization to help ensure data confidentiality, integrity, and availability.

 

Watch the following video to review the three categories of information security controls:

 

 

Based on your review of the video, the Intellipath lesson, and the pipeline scenario, discuss the following:

 

Which information security control would you implement first as a disaster recovery tactic to try and prevent the problem in this scenario? Why?

In your opinion, why is each control is specifically important to ensure the security of companies such as Colonial Pipeline as a component of disaster recovery?

 

Word count 200-250

 

The post Colonial Pipeline cyberattack appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

CLICK HERE TO GET THIS ANSWER