1. A. Discuss the importance of SCADA security.

B. Why are SCADA systems particularly vulnerable to cyber treats? C. Using the X.805 security framework as a reference, discuss the SCADA security requirements for an electric, water or oil refinery enterprise.

2. A. What is meant by “Multi-modal Biometrics” for access control? B. In theory and in practice, what quantifiable advantages and disadvantages can be attributed to multi-modal biometrics?

3. A. Discuss the tradeoffs between life health, safety and protection vs. information system protection in a fire protection policy.

B. Identify and discuss examples of fire protection practices which have been changed because of their effects on humans.

4. A. Identify and discuss the key differences between disaster recovery and business continuity. B. Compare and discuss the similarities and differences between “cold”, “warm” and “hot” sites. Explain whether these sites are elements of a disaster recovery plan or a business continuity plan.

1. A. Discuss the importance of SCADA security.

B. Why are SCADA systems particularly vulnerable to cyber treats? C. Using the X.805 security framework as a reference, discuss the SCADA security requirements for an electric, water or oil refinery enterprise.

2. A. What is meant by “Multi-modal Biometrics” for access control? B. In theory and in practice, what quantifiable advantages and disadvantages can be attributed to multi-modal biometrics?

3. A. Discuss the tradeoffs between life health, safety and protection vs. information system protection in a fire protection policy.

B. Identify and discuss examples of fire protection practices which have been changed because of their effects on humans.

4. A. Identify and discuss the key differences between disaster recovery and business continuity. B. Compare and discuss the similarities and differences between “cold”, “warm” and “hot” sites. Explain whether these sites are elements of a disaster recovery plan or a business continuity plan.