We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Deconstruction assignment Essay Sample

essay
The whole doc is available only for registered users OPEN DOC

Get Full Essay

Get access to this section to get all help you need with your essay and educational issues.

Get Access

Deconstruction assignment Essay Sample

In the article ‘Cyber Security Risk Management In The SCADA Critical Infrastructure’ the author mainly aims at providing addition information that can help the engineering manager to make informed decision on how to develop and control cyber security. The author of the article begins by highlighting the risk associated with the cyber threat. In order to present the strategies that can be employed to manage the cyber security the author of the article utilizes the exploratory case study approach. The research question was to indentify which is the most appropriate documentation to use when performing risk and management. In addition the author also sorts to indentify the top three most important concerns when it comes to cyber security.

Data presented in this article was collected from the 47 organization and government members, 8 operating companies, 9 government agencies as well as 4 academic research entities. After conducting the research the author was able to establish that the supervisory control and data acquisition system poses real threat in an organization. In relation to this the author notes that most of the cyber attack risks are because of several contributing factors such as evolutionary change. The author of this article suggest that the engineer manager must proactively manage these new vulnerability in order to reduce any possible threat. Moreover from the result of the study the author of the article notes that there is need for the engineer to ensure that they implement proper input validation as well as the authentication process. In the conclusion of the article the author notes that utilizing the risk based assessment is one of the method that can provide the various organization with the highest return on investment.

Critique

The title of the article of the good since it is able to provide the reader with some insight regarding what was going to be presented in the study. In this case the author is able to inform the reader that the article was going to talk about issue related to cyber security management. The introduction provided in the article is important since it helps to give the reader some background information with regard to the study. Moreover the interviewing method used by the author is important since it allows him to acquire the required information. The author also provides a comprehensive data analysis that allows the readers to be able to understand the various risk associated with the cyber security. The results presented in the article are also in line with the data that is collected. Data collected from this article can therefore be used in the implementation of the cyber security system. Finally

I also agree with the recommendation provided in this article that there need for the management of various organizations to ensure that they implement strategy to help incidences of cyber insecurity.

Reference

Henrie, Morgan. “Cyber Security Risk Management in the SCADA Critical Infrastructure Environment.” Engineering Management Journal 25, no. 2 (June 2013): 38-45

We can write a custom essay

According to Your Specific Requirements

Order an essay

You May Also Find These Documents Helpful

Peculiarities of various assignment types

The educational process is diverse and full of interesting writing tasks which help students develop their academic abilities. Different assignments types are created by professionals in order to enhance students’ level of analytical, critical and writing skills and to vary the learning process. As a student, you will encounter numerous tasks of diverse complexities throughout your student life. Sometimes, maybe, too complicated! They have different peculiarities, structural...

Making decisions in health and social care

Critically analyses the concepts, features, and importance of costs and accounting in making decisions in health and social care Cost accounting is a method used in accounting to capture a company’s or organisation’s production costs. It assesses the input costs of every step in production, fixed costs like depreciation of capital equipment. Cost accounting measures and records costs individually then compare the input results via...

Сhildren development

Physical development 7-12 years By the age of 7 a child enjoys things such as bike riding and rollerblading they are now able to tie and untie shoelaces without adult help, they are now starting to understand what rules are and are able to follow simple rules. At 8-12 years a child improves the physical skills that they have already developed and start to see...

Forex international trading market

Introduction Forex exchange is on the rise in Namibia; resulting in more people wanting to learn how to trade to try to increase their income so that they can enhance their standard of living. Forex Foreign exchange identifies the process of converting domestic currency into international banknotes at particular exchange rates (Bofah, 2017, para.1). As the number of foreigners in Namibia is increasing, more Namibians...

Aristotelian idea of God

This image produced in 1544 shows emerging's of the Judeo-Christians and Aristotelian's traditions. Aristotle was very interested in the idea of motion and said “The world is in a constant state of motion and change”. An example of how the world is changing is the growth of trees and plants. Aristotle believed in a prime mover, which is the being which creates change in the...

Get Access To The Full Essay
icon
300+
Materials Daily
icon
100,000+ Subjects
2000+ Topics
icon
Free Plagiarism
Checker
icon
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access
immediately?

Become a member

Your Answer Is Very Helpful For Us
Thank You A Lot!

logo

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?

Couldn't Find What You Looking For?

Get access to our huge knowledge base which is continuously updated

Next Update Will Be About:
14 : 59 : 59
Become a Member