100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Other

WGU C843 KOP2 Task 1 |Passed on First Attempt |Latest Update with Complete Solution

Rating
-
Sold
-
Pages
5
Uploaded on
04-07-2025
Written in
2024/2025

WGU C843 KOP2 Task 1 |Passed on First Attempt |Latest Update with Complete Solution










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
July 4, 2025
Number of pages
5
Written in
2024/2025
Type
Other
Person
Unknown

Subjects

Content preview

WGU C843 KOP2 Task 1 |Passed on First Attempt
|Latest Update with Complete Solution


Azumer Water Cybersecurity Incident Case Study
Introduction

Azumer Water, a non-governmental organization (NGO) based in League
City, Texas, partners with the Federal Emergency Management Agency
(FEMA) to provide clean drinking water to urban communities in the
southwestern United States affected by disasters. With a mission to "help
communities restore livelihoods" and a motto of "clean water heals a
community faster in a disaster," the organization aims to deliver bottled
water within 24 hours of a disaster’s impact. Employing 10 full-time staff
and relying on 1,073 regional volunteers, Azumer Water coordinates
logistics from its main office, where a local database stores sensitive
volunteer information, including contact details, background checks,
training records, and partial Social Security numbers.

In 2025, Azumer Water faced a significant cybersecurity incident that
compromised its volunteer database and disrupted operations. This case
study analyzes the incident, identifies vulnerabilities and risks, evaluates
regulatory noncompliance, and proposes immediate and long-term solutions
to enhance the organization’s security posture. It serves as a learning tool
for understanding the importance of proactive security governance, incident
response planning, and risk management in small NGOs.

Incident Overview

On a Friday afternoon, John Smith, Azumer Water’s volunteer coordinator,
received a phishing email from "" offering
discounted water pallets. Busy updating volunteer addresses in the
database, John clicked a malicious link, which likely delivered malware. The
link led to a non-existent webpage, and John noted to follow up later. By
Saturday, volunteers received fraudulent emails from
"," posing as John and soliciting donations via a web
form. Confused, 71 volunteers sent angry emails to John, suspecting a scam.

On Monday, as the new Information Security Officer (ISO) began their role,
John reported that the volunteer database was inaccessible, and the angry
emails highlighted a breach. The incident exposed vulnerabilities in Azumer
Water’s infrastructure, compromised sensitive data, and threatened its

, mission-critical operations.

Part I: Incident Analysis and Response

Why the Attack Succeeded


The attack succeeded due to critical vulnerabilities in Azumer Water’s
security practices:

1. Lack of Phishing Awareness Training: John’s decision to click the
phishing link reflected a lack of training on identifying suspicious
emails. The email’s domain ("watersupp1y.int") was not Azumer
Water’s official "@azumerwater.org" and contained a typo, but John
failed to recognize these red flags. This human error allowed malware
to infiltrate the network.

2. Unconfigured Enterprise Firewall: Pruhart Tech, Azumer Water’s
IT contractor, installed an enterprise firewall but deferred its
configuration. This left the network unprotected, allowing the
malicious payload to pass undetected to John’s computer,
compromising the database.

Compromise of Security Principles

Using NIST SP 800-122 ("Guide to Protecting the Confidentiality of
Personally Identifiable Information"), the incident compromised four key
security principles:

1. Confidentiality: NIST emphasizes training to prevent unauthorized
PII access (McCallister et al., 2010, 4.1.2). The lack of training led to
the database breach, exposing volunteer PII (e.g., contact details,
partial Social Security numbers).

2. Personally Identifiable Information (PII): The database stored
unaltered PII, violating NIST’s recommendation for de-identification
(McCallister et al., 2010, 4.2.3). Attackers used this data to send
fraudulent emails, increasing the risk of identity theft.

3. Integrity: Fraudulent emails damaged Azumer Water’s reputational
integrity, as volunteers expressed anger and confusion, eroding trust
in the organization.

4. Availability: The database, stored on a local machine without
backups (except occasional USB copies), was deleted, halting
operations. NIST stresses regular backups to ensure availability
(McCallister et al., 2010, 5.3).

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
professoraxel Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
2378
Member since
3 year
Number of followers
1570
Documents
19350
Last sold
2 days ago
THE EASIEST WAY TO STUDY NURSING EXAMS,STUDY GUIDES,TESTBANKS AND QUALITY EXAMS

Better grades start here! Find Study Notes, Exam answer packs, Assignment guided solutions and more. Study faster & better. Always leave a review after purchasing any document so as to make sure our customers are 100% satisfied.....All the Best!!!!!!

3.8

454 reviews

5
210
4
80
3
86
2
26
1
52

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions