100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Overig

WGU C843 KOP2 Task 1 |Passed on First Attempt |Latest Update with Complete Solution

Beoordeling
-
Verkocht
1
Pagina's
5
Geüpload op
04-07-2025
Geschreven in
2024/2025

WGU C843 KOP2 Task 1 |Passed on First Attempt |Latest Update with Complete Solution

Instelling
Vak

Voorbeeld van de inhoud

WGU C843 KOP2 Task 1 |Passed on First Attempt
|Latest Update with Complete Solution


Azumer Water Cybersecurity Incident Case Study
Introduction

Azumer Water, a non-governmental organization (NGO) based in League
City, Texas, partners with the Federal Emergency Management Agency
(FEMA) to provide clean drinking water to urban communities in the
southwestern United States affected by disasters. With a mission to "help
communities restore livelihoods" and a motto of "clean water heals a
community faster in a disaster," the organization aims to deliver bottled
water within 24 hours of a disaster’s impact. Employing 10 full-time staff
and relying on 1,073 regional volunteers, Azumer Water coordinates
logistics from its main office, where a local database stores sensitive
volunteer information, including contact details, background checks,
training records, and partial Social Security numbers.

In 2025, Azumer Water faced a significant cybersecurity incident that
compromised its volunteer database and disrupted operations. This case
study analyzes the incident, identifies vulnerabilities and risks, evaluates
regulatory noncompliance, and proposes immediate and long-term solutions
to enhance the organization’s security posture. It serves as a learning tool
for understanding the importance of proactive security governance, incident
response planning, and risk management in small NGOs.

Incident Overview

On a Friday afternoon, John Smith, Azumer Water’s volunteer coordinator,
received a phishing email from "" offering
discounted water pallets. Busy updating volunteer addresses in the
database, John clicked a malicious link, which likely delivered malware. The
link led to a non-existent webpage, and John noted to follow up later. By
Saturday, volunteers received fraudulent emails from
"," posing as John and soliciting donations via a web
form. Confused, 71 volunteers sent angry emails to John, suspecting a scam.

On Monday, as the new Information Security Officer (ISO) began their role,
John reported that the volunteer database was inaccessible, and the angry
emails highlighted a breach. The incident exposed vulnerabilities in Azumer
Water’s infrastructure, compromised sensitive data, and threatened its

, mission-critical operations.

Part I: Incident Analysis and Response

Why the Attack Succeeded


The attack succeeded due to critical vulnerabilities in Azumer Water’s
security practices:

1. Lack of Phishing Awareness Training: John’s decision to click the
phishing link reflected a lack of training on identifying suspicious
emails. The email’s domain ("watersupp1y.int") was not Azumer
Water’s official "@azumerwater.org" and contained a typo, but John
failed to recognize these red flags. This human error allowed malware
to infiltrate the network.

2. Unconfigured Enterprise Firewall: Pruhart Tech, Azumer Water’s
IT contractor, installed an enterprise firewall but deferred its
configuration. This left the network unprotected, allowing the
malicious payload to pass undetected to John’s computer,
compromising the database.

Compromise of Security Principles

Using NIST SP 800-122 ("Guide to Protecting the Confidentiality of
Personally Identifiable Information"), the incident compromised four key
security principles:

1. Confidentiality: NIST emphasizes training to prevent unauthorized
PII access (McCallister et al., 2010, 4.1.2). The lack of training led to
the database breach, exposing volunteer PII (e.g., contact details,
partial Social Security numbers).

2. Personally Identifiable Information (PII): The database stored
unaltered PII, violating NIST’s recommendation for de-identification
(McCallister et al., 2010, 4.2.3). Attackers used this data to send
fraudulent emails, increasing the risk of identity theft.

3. Integrity: Fraudulent emails damaged Azumer Water’s reputational
integrity, as volunteers expressed anger and confusion, eroding trust
in the organization.

4. Availability: The database, stored on a local machine without
backups (except occasional USB copies), was deleted, halting
operations. NIST stresses regular backups to ensure availability
(McCallister et al., 2010, 5.3).

Geschreven voor

Instelling
Vak

Documentinformatie

Geüpload op
4 juli 2025
Aantal pagina's
5
Geschreven in
2024/2025
Type
OVERIG
Persoon
Onbekend

Onderwerpen

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
professoraxel Havard School
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2448
Lid sinds
3 jaar
Aantal volgers
1578
Documenten
19702
Laatst verkocht
12 uur geleden
THE EASIEST WAY TO STUDY NURSING EXAMS,STUDY GUIDES,TESTBANKS AND QUALITY EXAMS

Better grades start here! Find Study Notes, Exam answer packs, Assignment guided solutions and more. Study faster & better. Always leave a review after purchasing any document so as to make sure our customers are 100% satisfied.....All the Best!!!!!!

3,8

466 beoordelingen

5
218
4
81
3
86
2
26
1
55

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen