Need help with the research paper (minimum 10 pages) – bibliography should be separate and not part of 10 pages.

The paper is due on end of day Sunday Feb 23,2020

Topic: Implementing Cybersecurity in the Energy Sector

Don't use plagiarized sources. Get Your Custom Essay on
Need help with the research paper (minimum 10 pages) – bibliography should be separate and not part of 10 pages.
Just from $13/Page
Order Essay

Imagine you have been hired as a security consultant for EnergyA which is an electric utility company based in the USA. The company has several locations in the U.S and is responsible for supplying a large portion of electricity for the Southeastern region in the U.S.

You have been charged with overseeing the implementation of cybersecurity best practices for EnergyA. In this course, you examined 10 design and security principles (Deception, Separation, Diversity, Commanlity, Depth, Discretion, Collection, Correlation, Awareness, Response) in the context of national and critical infrastructure protection. Identify any two security principles and evaluate and discuss how it can be applied to EnergyA.

Your case analysis needs to minimally address the following

 The relevance of cybersecurity in the energy sector

 Existing research on cybersecurity practices in the energy sector

 Why you are focusing on the specific two security principles

 For each security principle, identify its relevance in the energy sector

 For each security principle, identify how the principle can be implemented

 For each security principle, identify challenges presented in implementing it

 Discussion that connects your entire analysis with the topic and future implications of cybersecurity in the energy sector

Your research paper should be minimally 10 pages (double space, Font – Georgia with font size 12). The research paper needs cite at least 5 peer reviewed journal/book references.

The bibliography should be included as a separate page and is not part of the 10 page requirement. Student assignments will be run through Safe Assignment. Please ensure to check the safe assignment result prior to submitting.

You will have the chance to submit your assignment up to two times. So please submit earlier than the due date so you can check your safe assign score. You need to check your safe assign report to ensure there is no instance of academic integrity violations.

2/23/2020 Originality Report

https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c

4

8/originalityReport/ultra?attemptId=e8

7

fbc63-80d5-47cf-9bae-b663208f650… 1/

7

%27

%

2

%

1

SafeAssign Originality Report
Spring 2020 – Emerging Threats & Countermeas (ITS-834-01) – First Bi… • Final Case Analysis Paper

%29Total Score: Medium risk

Total Number of Reports

1
Highest Match

29 %
Final Research Paper.…

Average Match

29 %
Submitted on

02/23/20
01:06 PM PST

Average Word Count

3,30

4

Highest: Final Researc…

%29Attachment 1

Institutional database (6)

Student paper Student paper

Student paper

Student paper Student paper Student paper

Global database (4)

Student paper Student paper Student paper
Student paper

Internet (2)

scirp wikipedia

Top sources (3)

Excluded sources (0)

View Originality Report – Old Design

Word Count: 3,304

4 1

11

5 3

12

10 7

9

6

2

8

4 Student paper 1 Student paper 11 Student paper

Running head: IMPLEMENTING CYBER SECURITY IN THE ENERGY SECTOR 1

IMPLEMENTING CYBER SECURITY IN THE ENERGY SECTOR 2

Implementing Cyber security in the Energy Sector

University of the Cumberland’s

Abstract

Cybersecurity is important for any organization that needs to secure the data and recovers the network program from any type of cyberattacks. In the new age

of advanced technology, cybersecurity is important for data protection of different companies. Avoiding the cyber risk in the energy sector is a vital part of the nation
and as well as for the economy. The cybersecurity in the energy sector matters for energy business in the private corporation where the systems are under the

major targets of hostile agencies. The cyberattacks are the dreaded type of assaults for the information and security system of any state. According to many

surveys, cyberattacks are increased in the energy sector than in the last few years. So, there are risks over the important information recorded. This paper includes
the common role of cybersecurity in the energy sectors, best security processes that can protect the important and vital information, the two important principles, its
implementation, the importance of implementing and challenges that a company faced before implementing. The paper also includes the future implications and
literature review that describe the US-based energy sector named EnergyA that needed cybersecurity. As a security consultant, I include the issues and problems that

t f d di th i i l f b tt i l ti id f b d (S ith 2018)

1
2

3

4
1
4

https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport?attemptId=e87fbc63-80d5-47cf-9bae-b663208f6506&course_id=_114050_1&download=true&includeDeleted=true&print=true&force=true

2/23/2020 Originality Report

https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=e87fbc63-80d5-47cf-9bae-b663208f650… 2/7

an energy sector faces and discuss the principle for better-implementing ideas for an energy-based company (Smith, 2018).

Introduction

The technology-based world and the power of digitalization in the energy sector relate to more new technological inventions. It made cybersecurity more important
for the future of the energy sector. The energy, communication, and information on different technologies are now more essential and independent for protecting
and monitoring the infrastructure of energy that is growing. The cybersecurity in the energy sector becomes challenging for many organizations. The state-level and
non-state level hackers increase more sophisticatedly in their attack and keep up with the latest threads. So, the energy sectors needed to protect the infrastructure
and assets. The energy sector’s cybersecurity has financial advantages, that incorporating the prominent effectiveness in the defense for energy utilization

(Harknett & Stever, 2009). The relevance of cybersecurity in the energy sector is it can protect the network from hackers and provides comprehensive solutions for
security management. The cyber-attacks from malfunctioning software most of the time threaten the basic infrastructure of the framework. So, with strong
cybersecurity, the weakness of the framework can be improved. So, to control the issues, the energy part should build the arrangement progression and quality

framework protection that can avoid cyber-attacks and protect the energy framework. So, the part of cybersecurity helps by the guidelines for energy segments. The
safety process should look after the wide scope of issues that needed to be cover. These methodologies are implied reciprocal that strengthens the energy

section structure that loads in as a model in developing certain shortcomings. This sequence empowers you to support sustainable power source and give assurance
for power arrangements at the level of distributions. Energy sectors or organizations ought to ensure that they perform the correct steps to guarantee that their
information is secured. The security in the energy sector cannot be decided within the production house as it stands for much more than it. The energy sector needed
to encounter the intimidation of actual alerts, threat arrangement, and risk analysis. The electrical energy organizations encompass both the information technology
and power that needed security measures and security arrangements. The threat extenuation of cyber produces exertions, interruption, huge spending,

emotional and financial influences that affect the organization’s performance and economics. The cybersecurity system in the energy sector can recognize the threats,
implement the needed supervision, can expand quickly, delivers significant compliance capability and joined the security management. Cyber Security for US

based energy sector: For energy sectors, we can say that energy sectors consist of electricity, natural gas, and oil assets which are geographically connected with
systems and networks. Hence, interdependency within the area and over the Nation’s important infrastructure sectors is crucial. This energy infrastructure gives fuel
to their Nation and depends on the Nation’s communications, transportation, finance, and administration infrastructures. The power systems and networks channels
cross the Nation’s boundaries, creating international collaboration a vital component of the Energy Sector’s purposes. To protect and improve the energy sector
management needs continued vigilance, training, contingency planning.

4
4
4
1
2

That makes the sector able to face natural and manmade disasters. The energy sectors can have an overall strategy and numerous programs sponsored by private
and as well as public organizations. These organizations support the security facts and goals. The security programs can be divided into four categories like sharing of
information and communication, planning and coordination, cybersecurity, and public confidence. Us government tags the energy sectors for its infrastructure areas
that need financial security, and public health security. The energy sectors are responsible for the Nation’s power infrastructure. So, the energy sectors deal with
important data of infrastructures, water, and transport network that needed to be recorded safe. The energy utilities need awareness and strong technical
cybersecurity strategies for cyber risk management and to recognize the endangered systems. The cyber securing implementation can benefit the EnergyA electric
utility sector by protecting its important data or other information and by risk management. The research paper will highlight the best practices of cybersecurity that
important for EnergyA and the total concept, implementation, challenges of two principles Deception and Collection. Literature review

The electricity production is vital for business and everyday issues for the United States. The Electrical power sectors of the United States include all the plants

that help to produce electricity, organizational broadcast, and delivery lines that carry powers to the clients. The power plant grid also connects with the electrical
utility and other power plant corporations in the states and regions of the united states. The US electrical power plant grid has a high degree of dependability in the
part of the electrical power method that can disappoint sometimes for the active, artificial, and usual events. The cybersecurity is the rising concept and issue for any
type of company data security mostly for the electronics sector of a country. The electrical sectors include both the electrical functions and critical structural units

while the operational and usual failures by the planning process and judicious investments. The implementation of the technological assets can enhance the
competence and exchange the evidence among other machines. The profit of the internet-connected digital line is to crack the cybersecurity risks. Here the energy
sector is important for attaining maintainable growth in the US (Sun, Hahn, & Liu, 2018). The responsibility of the smart power grids or power plant sector is relentless,
dependable and satisfactory for individual personal needs to the authoritative need (Hawk & Kaushiva, 2014). Most of the attackers swelled into the energy are

prompting the capability of the relentless supply of the electronic flow when supply is disrupted. The security attackers guarantee the security of network and
important data by guaranteed strength and dependency. The security attacks on the division of energy control all the unlawful passages of the whole framework. It
also looks after the customer issues and the client’s important information or personal data. The utilization of an advanced meter system, the estimation, the key
zone of a power cut, and market power threats all is included in the whole framework. The attackers can hack the appropriate framework of power. They can

send an infection by the Trojan steed and access the total frameworks thus counter the risk. The energy sector firms are criticized due to the spending on
cybersecurity in the sector of rising jeopardies. The US-based electrical utilities are slower than the danger and needed to uphold the worthy resources to enhance the
power of cybersecurity. In that case, a few important steps should be taken. Some important steps that needed are, the insurance coverage for any disastrous action
must be improved. Ensuring the large and small power generators and power grid operators should stand by the string rules which defend the infrastructure

and have adequate resources for investment to the cybersecurity protection. In the same context of cybersecurity, public resources of the finance needed to train
security professionals. The US government should look after the management for cybersecurity that protects the network system and the important data. EnergyA is
the US-based company that examined because its expense is low and simple for utilization. It has a quick speed for countering the risks, dangers, and network or
cyber problem issues. The attackers build up the Rootkit for their help on the web violations. It is part of the Energy Delivery System that called a network that
produces, transfers and distributes energy (Hernández et al., 2015). The Rootkit alludes to the malfunctioning of the illegal PC program that used for special

access while hidden conditions. The exploiting weakness activities use specifically the backdoor attack in the time of detection. It happens because of the asset using
that having a tendency of being exceptionally muddled.

1
1
4
4
1
4

It helps the programmers for seizing servers in a providing firm and organizations pay more for that. The unstoppable refreshing of the programming and activation
of virus afterward progress undoubtedly. The preparation and taking the alert against the attack and hackers can work greatly. In the end, by making too complex a
password the data can be saved, and the destruction of the unwanted records makes the hacking difficult for the attacker. The improved innovation technologies and
learning about IT (Information Technology) help the company from high ranges assaults. the device protection of the energy sector company “EnergyA” has adapt the
new innovations for being productive and relied upon the dependability and protection. The US-based company has the concocted machine for safety efforts. By
using the Sophos UMT risk can be identified and obscure free signatures and signs in the form of boost. As a security consultant for Energy A, I want to discuss two

2/23/2020 Originality Report

https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=e87fbc63-80d5-47cf-9bae-b663208f650… 3/7

security principles, i.e., deception and for implementing in the energy sector. Reasons to focus on security principle: The cyber threats to the energy sector are
increasing day by day. There are different types of security threats in the national infrastructure and it can be protected through cybersecurity. The threats to the

national infrastructure of the USA are–Integrity, confidentiality, availability, and theft. To defend the energy sector from the advanced cyber-attacks we need some
cybersecurity principles and protections. The components of energy sectors include the deception traps and this concept never goes with the plan. The

deception principles must include the theory of sharing results and insights through traps. Deception

To amplify the pre-existing cybersecurity methods the deception concept is implemented. The existing firewall and security systems lead to the insufficient

capability of detection and reporting. The deception technology tools help to protect the critical infrastructure and sensitive data. The cyber attackers in the

energy sector have developed a risk-based multilayer program called defense-in-depth. The defense-in-depth approach decreases the risk and provides maximum
protection against the breach. In each of the protection layers this approach is worked and a mix of defensive and offensive measures ((Attivo Networks, 2019). This
includes lures, application and data deceptions to identify the conflicts. It provides an active protection wall to the energy sectors and helps to detect the in-network
threats with high response. To protect the information of the sector it provides early detections, alerts, misconfigurations. The approach is based on the risks of

the enterprise like- robust governance, systematic risk management and multi-dimensional programs with the standard frameworks. This creates more challenging
firewalls for the attackers to penetrate in implementation of defensive measures. This approach gives some situations to make the ability of the manual operation.
Implementation: The energy sectors deal with the trap in the production system and some malfunction operators with wrong interpretations. In present, the issues in
the energy sector need to adopt the deception for protection. The defense-in-depth approach is implemented by the segmentation network in which all the

assets sharing the requirements and improves the effectiveness of the security by reducing the connections downtime. The auditing of the software applications,
endpoint controlling is used in different energy-producing points and patched with configurations. The system users trained for the threats in the energy systems. The
threats are identified in the social engineering department which can help the trackers to access the data and to avoid the threats and protect the data by using the
secured network devices. The networks are must be protected and audited for the users from different devices for accessing their files and if any threats detected
then it should be blocked in time. The stakeholders must be sure that the systems are not accessing from any unsecured networks or devices and any allowance of
threats in firewalls and protected from the intruders. Challenges in Implementation: The challenges that are facing in the process of implementation of deception,
there are several challenges that are facing, like- the concept must be attractive, simple and easy to operate and able to cover the attacking surfaces. The challenges
that are facing in the process of defense-in-depth approach there are also some challenges faced in the process of implementation. In the process of the installation
of the first layer to defense, there is a need for access control of the devices in the LAN which includes the router controls in the nearby environments and includes
the access rules in the enterprise. The system can be manipulated according to the challenges. It is better to make a second firewall for defense with the same utility
but also includes the procedure of scanning for invalid capabilities to avoid the failure.

1
4
4
4
4
4

If there is no diversity in the process, then there will be the same types of failure as the first layer. Also, a compilation in energy sector protection is a multilayer
defense. It is assumed that the existence of the network perimeter must be secured. So, it implies that the network deals with many flaws at the time of the audit. This
can help the attackers to penetrate the system. To avoid the political and geographical limitations in the system there must be a defined and objected defense

needed. Separation: The separation of privilege principle provides more protection that can be taken from different actions and executions. The system becomes
more robust to protect from the breaches of trust and receiving access to the privileges. The AC model which supports the duty separation also supports the principle.
If the access model does not support, then PBM supports the duty separation. The separation of duties comes with the objects of prevention of conflict of interest,
fraud or abuse and errors. Also, the objective of the detection of failures of the security controls like- security breaches, theft of information, etc. the design of the
separation of duties states that there is no conflict between the responsibilities of the individuals of the sector(Plate, Basile, & Paraboschi, 2013). The control process
of separation of duties is reviewed by the auditors. The auditors listed in an audit report about the material deficiencies due to the risks. There must be a need for the
test of vulnerability and penetration to cybersecurity. By using the protocols of the energy sector, SCADA (supervisory control and data acquisition) handles the
firewalls. The SCADA practices the standard firewalls which are adapted to the single protocols for an application. To protect the energy sector any modification of the
tool is not accepted. The protection of the infrastructure rarely self-controlled approach in present to unravel the asset of the sector. It is also not succeeded in a

solitary domain to get any access to view an organizational infrastructure. If the firewall is not improved for applications like SCADA that need protocol support, then
the risk arises (Lakhoua, 2018). Implementation: SCADA involves the computers and the applications for the service in the energy sector like – electricity to the
Americans. The committee of the Critical Infrastructure Protection and the Department of Energy take some steps to help the organization to recover the

security of SCADA networks. By the study of the data and control of equipment, the SCADA systems are used. To increase the security of the SCADA networks in

the EnergyA corporation- there must be a need for risk analysis to measure all the requirements of the assembly to the SCADA network. There must be a need to

progress the networks to the SCADA network and how the networks are protected. Also, the unusual networks which are connected to the SCADA network must be
removed. Any connection that must be added to the network explains the security issues even if the connection to the network reasons a pathway from the

internet. To strengthen the SCADA networks in the Corporation there is a need to remove the services which are not useful. To classify the secure configurations and
to adopt any changes in the operational systems and to assure the removal of the services there must be a need to work closely with the vendors. Also, there is a
need to device IDS (intrusion detection systems) and monitoring the incidents. Also, there is a need to review the SCADA networks and other networks linked to the
SCADA network to assess security. Challenges in Implementation: The systems are easy to accept for supervising and automation engineering for the applications.
This acceptance is also robust the electric power. There are always some limitations in the linking process of the energy sectors to the SCADA systems. Also, all

the inputs relate to a fixed power supply to a SCADA system. PLC (programmable logic controller) and RTU (remote telemetry unit) are positioned in a location that is
remote and cannot strengthen to a secure source for power. Rather they depend on the batteries with some process of replacement. The solar panel also can be used
but it needs some maintenance. They are vulnerable to damage when they are connected at street level in urban environments. Conclusion

This paper has elaborately described the difficulties faced in the process of implementation of cyber security in the energy sector. The attackers on effective

execution of attacks can compromise the standards of cybersecurity. EnergyA company is familiar to the fact of the risks related to cyber from the cyber threats which
is expanding with frequent attacks. The energy companies are the increasing targets for the attacks for the disturbance. Cyber risk is challenging, and the corporations
are classifying and plotting the risks and using a cybersecurity capability model with the principles for controlling the environment and structuring safe and strong use
of the energy sector.

4

5

1
6
1
1
1
1
4

Bibliography

Hernández, J. M., Ferber, A., Prowell, S., & Hively, L. (2015, April). Phase-space detection of cyber events. In Proceedings of the 10th Annual Cyber and Information

h f k h b d h d h l l k

7

2/23/2020 Originality Report

https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=e87fbc63-80d5-47cf-9bae-b663208f650… 4/7

Source Matches (42)

Student paper 72%

scirp 73%

Student paper 100%

Student paper 78%

Student paper 71%

Student paper 70%

Student paper 72%

Student paper 63%

Student paper 65%

Student paper 76%

scirp 67%

Security Research Conference (pp. 1-4). Hawk, C., & Kaushiva, A. (2014). Cybersecurity and the smarter grid. The Electricity Journal, 27(8), 84-95. Harknett, R.

J., & Stever, J

. A. (2009). The cybersecurity triad: Government, private sector partners, and the engaged cybersecurity citizen. Journal of Homeland Security

and Emergency Management, 6(1). Plate, H., Basile, C., & Paraboschi, S. (2013). Policy-driven system management. In Computer and information security handbook
(pp. 427-460). Morgan Kaufmann. Sun, C. C., Hahn, A., & Liu, C. C. (2018). Cyber security of a power grid: State-of-the-art. International Journal of

Electrical Power & Energy Systems, 99, 45-56. Lakhoua, M. N. (2018, November). Cyber Security of SCADA Network in Thermal Power Plants. In 2018 International

Conference on Smart Communications and Networking (SmartNets) (pp. 1-4). IEEE. Smith, D. C. (2018). Enhancing cybersecurity in the energy sector: a critical

priority.

8 9

10 9

11 12 11

11
1
1
Student paper

IMPLEMENTING CYBER SECURITY IN THE
ENERGY SECTOR 1

Original source

Implementing Cybersecurity in the
Energy Sector 1

2
Student paper

IMPLEMENTING CYBER SECURITY IN THE
ENERGY SECTOR 2 Implementing Cyber
security in the Energy Sector

Original source

100Report, Cyber Security in the Energy
Sector

100Report, Cyber Security in the
Energy Sector

3
Student paper

University of the Cumberland’s

Original source

University of Cumberland’s

4
Student paper

Cybersecurity is important for any
organization that needs to secure the
data and recovers the network program
from any type of cyberattacks.

Original source

It is important to have Cybersecurity in
any organization to secure and recover
of devices, data, network and program
from any type of cyberattacks

1
Student paper

The cybersecurity in the energy sector
matters for energy business in the
private corporation where the systems
are under the major targets of hostile
agencies.

Original source

Cybersecurity in the energy sector does
matters, and since the energy business is
primarily preceded by private
corporations, their systems are under
major targets by both crooks and hostile
agencies

4
Student paper

According to many surveys, cyberattacks
are increased in the energy sector than
in the last few years.

Original source

According to the survey of the Global
State of Information and security, the
cyberattacks are increased in the energy
sector in the last few years

4
Student paper

The energy sector’s cybersecurity has
financial advantages, that incorporating
the prominent effectiveness in the
defense for energy utilization (Harknett &
Stever, 2009).

Original source

Cybersecurity in the energy sector has
brought numerous financial advantages,
incorporating more prominent
effectiveness in the defense of energy
utilization

4
Student paper

So, to control the issues, the energy part
should build the arrangement
progression and quality framework
protection that can avoid cyber-attacks
and protect the energy framework.

Original source

So as to control this issue, the energy
part should set up a progression of
arrangements and standards to protect
energy framework from cyber attacks

4
Student paper

These methodologies are implied
reciprocal that strengthens the energy
section structure that loads in as a model
in developing certain shortcomings. This
sequence empowers you to support
sustainable power source and give
assurance for power arrangements at
the level of distributions. Energy sectors
or organizations ought to ensure that
they perform the correct steps to
guarantee that their information is
secured.

Original source

These methodologies are potential
reciprocal that reinforces energy
segment framework that fills in as a
model in improving certain shortcomings
this progression empowers you to verify
sustainable power source, assurance of
power arrange at the degree of
distributions energy organizations ought
to guarantee that they execute the
correct measures to guarantee that their
information is ensured

1
Student paper

The threat extenuation of cyber
produces exertions, interruption, huge
spending, emotional and financial
influences that affect the organization’s
performance and economics.

Original source

The cyber threat extenuation produces
huge spending, exertions, interruption,
financial and emotional influences on the
business that could affect in destroying
the company’s performance and the
nationwide economies

2
Student paper

Cyber Security for US based energy
sector:

Original source
100Report, Cyber Security in the Energy
Sector

2/23/2020 Originality Report

https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=e87fbc63-80d5-47cf-9bae-b663208f650… 5/7

Student paper 67%

Student paper 68%

Student paper 67%

Student paper 66%

Student paper 67%

Student paper 64%

Student paper 71%
Student paper 76%
Student paper 65%
Student paper 71%
Student paper 71%
1
Student paper

The electricity production is vital for
business and everyday issues for the
United States. The Electrical power
sectors of the United States include all
the plants that help to produce
electricity, organizational broadcast, and
delivery lines that carry powers to the
clients. The power plant grid also
connects with the electrical utility and
other power plant corporations in the
states and regions of the united states.

Original source

Electricity production is critical to the
business and everyday operations of the
United States The electrical power grid in
the United States includes all the power
plants producing electricity, organized
with the broadcast and delivery lines and
systems which carry power to end-use
clients The grid also links the many
visibly and privately-owned electrical
utility and other wholesale power
corporations in unalike states and
regions of the United States

1
Student paper

The electrical sectors include both the
electrical functions and critical structural
units while the operational and usual
failures by the planning process and
judicious investments.

Original source

Cybersecurity is a rising concern for both
electrical functions and other critical
structure units, while usual and
operational failures can be alleviated
slightly by planning and judicious
investments

4
Student paper

Most of the attackers swelled into the
energy are prompting the capability of
the relentless supply of the electronic
flow when supply is disrupted.

Original source

Attackers have swelled into the energy
area prompting the ability of the
segment to guarantee a relentless supply
of electric flow thus the ensured of
supply is disrupted

4
Student paper

The attackers can hack the appropriate
framework of power. They can send an
infection by the Trojan steed and access
the total frameworks thus counter the
risk.

Original source

Attackers hack appropriate framework
working, attacks on power frameworks
Attackers may send an infection to be it a
Trojan steed or by means of phishing
and access the frameworks thus there is
a need procedure to counter the
wrongdoing

1
Student paper

Ensuring the large and small power
generators and power grid operators
should stand by the string rules which
defend the infrastructure and have
adequate resources for investment to
the cybersecurity protection.

Original source

· Ensure that both large and small
electricity generators and grid operators
must stand by strong federal rules to
defend the national infrastructure and
have adequate resources to invest in
cybersecurity protections

4
Student paper

The Rootkit alludes to the malfunctioning
of the illegal PC program that used for
special access while hidden conditions.

Original source

It alludes to illegal PC program used in
the arrangement of proceeded with
special access to a PC while hidden from
everything

1
Student paper

The threats to the national infrastructure
of the USA are–Integrity, confidentiality,
availability, and theft.

Original source

The practice discourses all four types of
security threats (Confidentiality, Integrity,
Availability, and theft) to national
infrastructure

4
Student paper

The deception principles must include
the theory of sharing results and insights
through traps.

Original source

These programs of deception should
include the theory of sharing insights and
results through operational traps

4
Student paper

The existing firewall and security systems
lead to the insufficient capability of
detection and reporting.

Original source

Information security management
always had a belief that the existing
firewall and security defense systems
made the capability of reporting in the
event compromise and insufficient
detection

4
Student paper

The cyber attackers in the energy sector
have developed a risk-based multilayer
program called defense-in-depth.

Original source

With the references of sophistication and
enterprise risks made by cyber attackers
in the energy sector have developed a
comprehensive risk-based program
which has a multilayer support system
approach called Defense-in-depth

4
Student paper

The approach is based on the risks of the
enterprise like- robust governance,
systematic risk management and multi-
dimensional programs with the standard
frameworks. This creates more
challenging firewalls for the attackers to
penetrate in implementation of
defensive measures.

Original source

This approach is more firm and made
one based on enterprise risks like robust
governance, systematic risk management
and multi-dimensional programs which
have best class standards and proven
frameworks This approach creates a
pavement for more challenging firewalls
for the attackers to fully penetrate
through a system which gives necessary
time in implementing the defensive
measures

2/23/2020 Originality Report

https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=e87fbc63-80d5-47cf-9bae-b663208f650… 6/7

Student paper 69%

Student paper 68%
Student paper 69%

Student paper 77%

Student paper 63%
Student paper 65%
Student paper 65%

Student paper 73%

Student paper 71%

Student paper 80%

Student paper 93%

wikipedia 66%

Student paper 100%
4
Student paper

The defense-in-depth approach is
implemented by the segmentation
network in which all the assets sharing
the requirements and improves the
effectiveness of the security by reducing
the connections downtime. The auditing
of the software applications, endpoint
controlling is used in different energy-
producing points and patched with
configurations. The system users trained
for the threats in the energy systems.

Original source

This is implemented by a segmentation
network approach in which all the energy
assets will be sharing a similar kind of
requirements and this helps in improving
the effectiveness of the system security
entirely by reduction of connections
downtime and making improvements in
energy optioned Endpoint controlling is
also the same as auditing the software
used in the various energy-producing
and distribution points and should be
ensured that they are patched with
required configurations within the
network infrastructures to be secured
system users need to be trained for the
possible threats which occur in the
energy systems

4
Student paper

To avoid the political and geographical
limitations in the system there must be a
defined and objected defense needed.

Original source

To avoid this political and geographical
boundary in the system is to be defined
and objected

5
Student paper

It is also not succeeded in a solitary
domain to get any access to view an
organizational infrastructure.

Original source

This is unsuccessful as it allows an
burglar in a solitary domain to get access
to an extensive view of the organizational
infrastructure

1
Student paper

The committee of the Critical
Infrastructure Protection and the
Department of Energy take some steps
to help the organization to recover the
security of SCADA networks.

Original source

The President’s Critical Infrastructure
Protection Committee and the
Department of Energy (DoE) have
established the definitive steps to help
any organization recover the security of
its SCADA networks

6
Student paper

By the study of the data and control of
equipment, the SCADA systems are used.

Original source

SCADA systems are used to monitor and
control

1
Student paper

There must be a need to progress the
networks to the SCADA network and how
the networks are protected.

Original source

It is also useful to progress a complete
considerate of all networks to the SCADA
network, and how well these networks
are protected

1
Student paper

Any connection that must be added to
the network explains the security issues
even if the connection to the network
reasons a pathway from the internet.

Original source

Any specific connection to additional
network familiarizes security issues,
mainly if the connection causes a
pathway from /to the Internet

1
Student paper

Also, all the inputs relate to a fixed power
supply to a SCADA system. PLC
(programmable logic controller) and RTU
(remote telemetry unit) are positioned in
a location that is remote and cannot
strengthen to a secure source for power.

Original source

When applied in the manufacturing
sector, all inputs to a SCADA system have
contact with a fixed and dependable
power supply By distinction, a
programmable logic controller (PLC) and
remote telemetry unit (RTU) positioned
in a remote location cannot effortlessly
be strengthened to a secure source of
power

1
Student paper

They are vulnerable to damage when
they are connected at street level in
urban environments.

Original source

They are also susceptible to damage and
robbery, mainly when they are
connected at street level in the city-urban
type of environments [12]

4
Student paper

The attackers on effective execution of
attacks can compromise the standards of
cybersecurity.

Original source

Attackers on the effective execution of
the attacks can compromise the
standards of cybersecurity like discretion,
deception, and collection

7
Student paper

In Proceedings of the 10th Annual Cyber
and Information Security Research
Conference (pp.

Original source

Proceedings of the 10th Annual Cyber
and Information Security Research
Conference

8
Student paper

Cybersecurity and the smarter grid.

Original source

“Cybersecurity and the distributed grid

9
Student paper

J., & Stever, J.

Original source
J., & Stever, J

2/23/2020 Originality Report

https://ucumberlands.blackboard.com/webapps/mdb-sa-BB5a31b16bb2c48/originalityReport/ultra?attemptId=e87fbc63-80d5-47cf-9bae-b663208f650… 7/7

Student paper 100%
Student paper 100%
Student paper 100%
Student paper 66%
Student paper 100%
Student paper 100%
Student paper 100%

10

Student paper

The cybersecurity triad: Government,
private sector partners, and the engaged
cybersecurity citizen.

Original source

The cybersecurity triad government,
private sector partners, and the engaged
cybersecurity citizen

9
Student paper

Journal of Homeland Security and
Emergency Management, 6(1).

Original source

Journal of Homeland Security and
Emergency Management, 6(1)

11
Student paper

C., Hahn, A., & Liu, C.

Original source

C., Hahn, A., & Liu, C

12
Student paper

Cyber security of a power grid:

Original source

Generation Power Grid Security

11
Student paper

State-of-the-art. International Journal of
Electrical Power & Energy Systems, 99,
45-56.

Original source

State-of-the-art International Journal of
Electrical Power & Energy Systems, 99,
45-56

11
Student paper

Cyber Security of SCADA Network in
Thermal Power Plants. In 2018
International Conference on Smart
Communications and Networking
(SmartNets) (pp.

Original source

Cyber Security of SCADA Network in
Thermal Power Plants In 2018
International Conference on Smart
Communications and Networking
(SmartNets) (pp

1
Student paper

Enhancing cybersecurity in the energy
sector: a critical priority.

Original source

Enhancing cybersecurity in the energy
sector a critical priority

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Our Services

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code Happy