100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Otro

WGU C843 KOP2 Task 1 |Passed on First Attempt |Latest Update with Complete Solution

Puntuación
-
Vendido
-
Páginas
5
Subido en
04-07-2025
Escrito en
2024/2025

WGU C843 KOP2 Task 1 |Passed on First Attempt |Latest Update with Complete Solution

Institución
Grado









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Grado

Información del documento

Subido en
4 de julio de 2025
Número de páginas
5
Escrito en
2024/2025
Tipo
Otro
Personaje
Desconocido

Temas

Vista previa del contenido

WGU C843 KOP2 Task 1 |Passed on First Attempt
|Latest Update with Complete Solution


Azumer Water Cybersecurity Incident Case Study
Introduction

Azumer Water, a non-governmental organization (NGO) based in League
City, Texas, partners with the Federal Emergency Management Agency
(FEMA) to provide clean drinking water to urban communities in the
southwestern United States affected by disasters. With a mission to "help
communities restore livelihoods" and a motto of "clean water heals a
community faster in a disaster," the organization aims to deliver bottled
water within 24 hours of a disaster’s impact. Employing 10 full-time staff
and relying on 1,073 regional volunteers, Azumer Water coordinates
logistics from its main office, where a local database stores sensitive
volunteer information, including contact details, background checks,
training records, and partial Social Security numbers.

In 2025, Azumer Water faced a significant cybersecurity incident that
compromised its volunteer database and disrupted operations. This case
study analyzes the incident, identifies vulnerabilities and risks, evaluates
regulatory noncompliance, and proposes immediate and long-term solutions
to enhance the organization’s security posture. It serves as a learning tool
for understanding the importance of proactive security governance, incident
response planning, and risk management in small NGOs.

Incident Overview

On a Friday afternoon, John Smith, Azumer Water’s volunteer coordinator,
received a phishing email from "" offering
discounted water pallets. Busy updating volunteer addresses in the
database, John clicked a malicious link, which likely delivered malware. The
link led to a non-existent webpage, and John noted to follow up later. By
Saturday, volunteers received fraudulent emails from
"," posing as John and soliciting donations via a web
form. Confused, 71 volunteers sent angry emails to John, suspecting a scam.

On Monday, as the new Information Security Officer (ISO) began their role,
John reported that the volunteer database was inaccessible, and the angry
emails highlighted a breach. The incident exposed vulnerabilities in Azumer
Water’s infrastructure, compromised sensitive data, and threatened its

, mission-critical operations.

Part I: Incident Analysis and Response

Why the Attack Succeeded


The attack succeeded due to critical vulnerabilities in Azumer Water’s
security practices:

1. Lack of Phishing Awareness Training: John’s decision to click the
phishing link reflected a lack of training on identifying suspicious
emails. The email’s domain ("watersupp1y.int") was not Azumer
Water’s official "@azumerwater.org" and contained a typo, but John
failed to recognize these red flags. This human error allowed malware
to infiltrate the network.

2. Unconfigured Enterprise Firewall: Pruhart Tech, Azumer Water’s
IT contractor, installed an enterprise firewall but deferred its
configuration. This left the network unprotected, allowing the
malicious payload to pass undetected to John’s computer,
compromising the database.

Compromise of Security Principles

Using NIST SP 800-122 ("Guide to Protecting the Confidentiality of
Personally Identifiable Information"), the incident compromised four key
security principles:

1. Confidentiality: NIST emphasizes training to prevent unauthorized
PII access (McCallister et al., 2010, 4.1.2). The lack of training led to
the database breach, exposing volunteer PII (e.g., contact details,
partial Social Security numbers).

2. Personally Identifiable Information (PII): The database stored
unaltered PII, violating NIST’s recommendation for de-identification
(McCallister et al., 2010, 4.2.3). Attackers used this data to send
fraudulent emails, increasing the risk of identity theft.

3. Integrity: Fraudulent emails damaged Azumer Water’s reputational
integrity, as volunteers expressed anger and confusion, eroding trust
in the organization.

4. Availability: The database, stored on a local machine without
backups (except occasional USB copies), was deleted, halting
operations. NIST stresses regular backups to ensure availability
(McCallister et al., 2010, 5.3).
$16.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
professoraxel Havard School
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2378
Miembro desde
3 año
Número de seguidores
1570
Documentos
19350
Última venta
2 días hace
THE EASIEST WAY TO STUDY NURSING EXAMS,STUDY GUIDES,TESTBANKS AND QUALITY EXAMS

Better grades start here! Find Study Notes, Exam answer packs, Assignment guided solutions and more. Study faster & better. Always leave a review after purchasing any document so as to make sure our customers are 100% satisfied.....All the Best!!!!!!

3.8

454 reseñas

5
210
4
80
3
86
2
26
1
52

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes