Choose one to response to
Protecting the Water Supply.
1.) Much of the water infrastructure is managed and controlled remotely via SCADA (Supervisory Control and Data Acquisition) systems. Typically, these are connected to networks, such as the Internet, where hackers might engage in malicious activity. Recent news reports reveal that hackers have been very aggressive in their efforts to seize control of these systems in power plants and other vital infrastructure facilities such as water treatment plants. Do you think private and local authorities understand and have prepared for this potential threat of a cyber attack on the water system? Provide at least three specific actions or measures you believe would be necessary and effective to enhance security and mitigate or protect against this particular threat, and defend your recommendations.
2.) Considering the familiar axiom, “the solution to pollution is dilution,” do you believe that the water sector is highly vulnerable? If so, which specific elements, systems, facilities or processes seem most vulnerable? Or, do you believe the threat to our water systems or supplies is exaggerated, and that this CI/KR sector is not really all that vulnerable, or that terrorists would not be attracted to those targets because it would be too difficult to create mass casualties or actual terror through attacking the water system due to the sheer volume of water diluting any potential contaminants? What about wastewater systems? How, if at all, would interdependencies between the water sector and other CI/KR sectors affect your view? Support your assertions and conclusions with logical arguments and evidence from research in authoritative sources.