This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Implementation and Maintenance Responses

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Implementation and Maintenance Responses

Problem 1

The technological aspect of the Positive Train Control (PTC) is the primary source of security issues for the system. For example, the use of a 5G network that is always online to allow communication with dispatchers and enables people on the network access to change the operations of the train poses a Cyber Security problem (FCC, 2017). Such a network gives hackers opportunities to interrupt the safe operations of the train for financial or ideological reasons, among others. For instance, if a terrorist group wants to cause human deaths in New York, they would only have to hack the network and change signals and shut out everyone else, and this could lead to a definite crash of the train while the terrorist remains at a safe distance. Also, there is a possibility of software defects (Young, N/d). For instance, if the software were to malfunction thus causing the system to send or show wrong signals, a false clear could lead to the crashing of trains or some other fatal accident on the tracks. For these reasons, it will never be safe to remove the conductor from the cab of the locomotive. They should increase the number of conductors to have enough people always checking to see that everything is working correctly.

Problem 2

Whether accidental or targeted, a breach of information security can have harmful and even fatal consequences. It could mean a violation of privacy, loss of assets and malpractice due to altered information among others. Administrators should always have this in mind when establishing safeguards and security tools; in fact, they should still know what kind of threats they are fending off and why. For this reason, according to Sharkasi (2015), administrators should conduct a regular inventory analysis where they determine what it is they are protecting. A well-maintained inventory will tell the administrator what security measures to take. Subsequently, the administrator should keep up with the risks of emerging technology because all technologies come with their vulnerabilities. If not checked, they can be used to attack or manipulate existing systems. Most importantly, the administrators should conduct a frequent risk assessment for their system because they allow for the update of possible risks and possible preventive measures and solutions.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask