Fact Pattern
You are the newly hired cybersecurity risk manager for city of Windermere. Windermere is a college town, with a population of 125,000, during the school year and 75,000 in the summers. Windermere has three large hospitals–a world-renown children hospital, a veterans hospital, and a teaching hospital associated with Windermere University\’s medical school. Windermere owns a water treatment facility which provides drinking water to homes and businesses, including the University and the three hospitals. Windemere has experienced a cybersecurity incident and hired an outside forensic expert to investigate and prepare an incident report. Windemere\’s city council has asked you to write a forward looking post-incident report that puts the incident in perspective and recommending policies and procedures to reduce the risk and losses of future cybersecurity incidents involving the water treatment plant.
The Cybersecurity Incident
During the early morning hours of Monday morning, August 29, an operator at Windemere\’s water treatment facility noticed unusual network activity while completing a report on a work laptop.
The operator noticed what appeared to be unauthorized remote access by an unknown, unauthorized individual to the water treatment facility\’s industrial control systems (ICS). See NIST – Definition of \”Industrial Control Systems\”.
A few seconds later, the operator lost all ability to control the operating screen and noted the following: the mouse moving on the operating screen independently, making changes, performing unauthorized activities, and then exiting the system.
The operator noted complete loss of control of the system lasted for approximately 3-5 minutes.
During this loss of control, the operator observed the unknown actor attempt to increase the amount of sodium hydroxide in the water supply to dangerous levels.
Modern water systems are engineered with many safeguards to keep parameters within acceptable limits, including ensuring that operators are trained and licensed to carefully monitor drinking water treatment operations.
In this incident, the operator observed the unauthorized actor raise the NaOH dose setpoint from its normal setting of 100 parts-per-million (ppm) to 11,100ppm.
NaOH is a chemical often used in drinking water treatment used to adjust pH and alkalinity.
Although an important component of the drinking water treatment process, NaOH can be a hazardous chemical to water consumers if concentrations exist in excess of safe operating parameters.
The increase in the amount of chemical added to the water resulted in dangerous levels, making the water not fit for human consumption.
Upon observing the unauthorized activity, the operator took swift action, identified the incident, reported it to upper management, and was able to manually restore the system to normal operating conditions swiftly, with no ill effects on public health or safety.
The Forensic Expert\’s Report
Windemere hired an outside cybersecurity forensics expert to investigate. The expert\’s report included four key findings:
FIRST FINDING: A legitimate remote access software package, with access to the internet, had been installed on the operator\’s laptop.
The plant\’s chief engineer had authorized installation of the remote access software on laptops used by 20 senior operators and 5 outside contractors. The software allowed these 25 individuals to access the plant\’s network while working offsite.
The chief engineer considered requiring two-factor authentication for those using the remote access software, but decided against it given that Windemere is a relatively small municipality with a modest budget.
SECOND FINDING: Evidence of damaging code inserted into the footer of a WordPress-based site associated with a water infrastructure constructions company contracted to provide services to the municipality.
The expert surmised that the malicious code was active for months prior to the incident reported by the plant operator.
While the malicious code was live, the site interacted with computers from municipal water utility customers, state and local government agencies, various water industry-related private companies, and normal internet bot and website crawler traffic.
THIRD FINDING: Prior to the events of Monday morning, an unknown actor, likely separate from the hackers who put the malicious code on the website, was able to gather sensitive data including the operating system and CPU, browser-type, touchpoints, input methods, presence of a web camera, microphone, video card display, and adapter details, likely with the purpose of improving the botnet malwareâs ability to impersonate legitimate web browser activity.
FOURTH FINDING: The malicious actor likely accessed the municipalitiesâ system by exploiting cybersecurity weaknesses including sharing of passwords between water management employees, use of an outdated Windows 7 operating system, and the use of desktop sharing software to gain unauthorized access to the system.
Your NIST Evaluation Report
Windemere\’s city council has asked you to write a 4-5 page NIST Evaluation Report.
The report should take into account:
The general facts about Windemere set forth in the first paragraph of the Fact Pattern.
The descriiption of the Cybersecurity Incident
The Forensic Expert\’s Report
In preparation for writing your report please read
The NIST Cybersecurity Framework Version 1.1.
Executive Summary – pp. v – vi
Framework Introduction – pp. 1-5.
Overview of the Framework.
Risk Management and the Cybersecurity Framework
Framework Basics: Framework Core – pp. 6-8
How to Use the Framework: Establishing or Improving a Cybersecurity Program – pp. 14-15
Appendix A: Framework Core – pp. 22-44.
Pay special attention to the first three columns:
Function (i.e. Core Function)
Category
Subcategory
Appendix B: Glossary – pp. 45-47
The American Water Works Association (AWWA) Process Control System Security Guidance for the Water Sector
Recommended Cybersecurity Practices – pp. 9-13
Recommended Cybersecurity Practices and Improvement Projects – pp. 16-21
Your report should discuss the NIST Cybersecurity Framework, as it applies to:
The general facts about Windemere set forth in the first paragraph of the Fact Pattern.
The descriiption of the Cybersecurity Incident
The Forensic Expert\’s Report
In particular, you should discuss the NIST Cybersecurity Framework\’s:
Identify Function
Category: Asset Management, and the Relevant Subcategories – pp. 24-25
Category: Risk Assessment, and the Relevant Subcategories – pp. 26-27
Category: Supply Chain Risk Management, and the Relevant Subcategories – pp. 28-29
Protect Function
Category: Identity Management, Authentication and Access Control, and the Relevant Subcategories – pp. 29-30
Detect Function
Category: Anomalies and Events, and the Relevant Subcategories – pp. 37-38
Category: Security Continuous Monitoring, and the Relevant Subcategories – pp. 38-39
Category: Detection Processes, and the Relevant Subcategories – p. 40
Respond Function
Category: Communications, and the Relevant Subcategories – p. 41
NOTE: Please use headings and subheading in your report, such as \”Identify Function – Category: Asset Management\” and \”Identify Function – Category: Risk Assessment,\” etc.
Please also incorporate the relevant Recommended Cybersecurity Practices from the American Water Works Association (AWWA) Process Control System Security Guidance for the Water Sector – pp. 9-12
Fact Pattern You are the newly hired cybersecurity risk manager for city of Wind
Why us
Why Use Our AI Assignment Helper?
Saves Hours of Brainstorming
No more staring at a blank page. Our AI gives you a strong starting point — so you can focus on refining, not figuring out what to say.
Boosts Writing Clarity and Structure
Messy thoughts? Confusing prompts? Our tool delivers clear, logically structured content that flows — just like a polished draft should.
Ideal for Complex or Technical Prompts
Struggling with statistics, nursing case studies, or legal briefs? Our AI understands nuance and handles specific academic formats with ease.
Ideal for Complex or Technical Prompts
Struggling with statistics, nursing case studies, or legal briefs? Our AI understands nuance and handles specific academic formats with ease.
Helps You Meet Tight Deadlines
Whether it’s due in two hours or overnight, you’ll get instant, reliable help when you need it most — no panic necessary.
Supports Research-Based Work
Every answer includes reference links, source ideas, or research cues — so you're not just done, you're also better informed.
Do I need it?
Who It’s For
Our Ai modal has been specifically trained for academic purpose across all levels of education
College Students
University Undergraduates
Master’s Students
PhD Candidates
Working Professionals in Continuing Education
"Gain Academic Advantages From IntelliAssign`s Top Features"
Don't waste endless hours struggling with homework problems. Question AI assists students with all kinds of academic tasks with 98% accuracy rates. Get detailed answers to challenging homework and exam questions with our powerful AI homework technology.
How it all works
This is how to unlock comprehensive answers and master your studies with our homework AI, in a fast, accurate, and educational fashion.
1
Step 1
Enter your question, upload instructions, or paste your prompt
2
Step 2
Choose output type: Draft, Detailed Solution, or Step-by-Step Guide
3
Step 3
Our AI generates your content with research links and references
Features of Our AI Assignment Helper
No Signups. No Barriers.
Jump straight in — no accounts, no logins. Just paste your assignment and
get instant help. It’s that simple.
Instant Results, 24/7
Whether it’s midnight before a deadline or mid-morning study break, our AI
delivers fast, accurate solutions in seconds — anytime, anywhere.
References Included
Every answer comes with real research links, sources, or citations to guide
your learning or help support your submission.
Trained for Assignments
Unlike generic AI tools, our model is fine-tuned for real academic
assignments. Essays, case studies, care plans, reflections — it gets it.
Built for All Levels
From first-year college students to PhD candidates, our AI adjusts to your
academic level and writing expectations.
Multiple Output Styles
Need a draft? A detailed answer? A step-by-step guide? We’ve got modes
for how you like to work.
Real Stories, Real Results
5/5
4/5
5/5
4/5
4/5
FAQs
Do I need to sign up to use the tool?
Nope! You can use the tool instantly — no accounts, no logins, and no personal data required.
Is it really free?
Yes! You can generate assignment help for free. We believe academic support should be
accessible to everyone.
What types of assignments can it handle?
Our AI supports a wide range of academic tasks — including essays, research papers,
reflections, case studies, reports, presentations, and more — for college, university, master’s,
and even PhD levels.
How accurate are the answers?
The AI is trained specifically for academic assignments. It delivers high-quality, structured
responses and even includes references and research links where possible to back up its
solutions.
Can I get step-by-step explanations?
Absolutely! Choose the Step-by-Step Mode to get a breakdown of how to approach or solve
the question — great for learning and understanding the topic better.
Is it plagiarism-free?
Yes — the content is generated uniquely each time. However, we always recommend
reviewing, editing, and citing properly to match your academic standards.
Can I use it for any subject?
Yes! Whether its Nursing, Business, Computer Science, Literature, or Law — the tool is built to
adapt to different academic disciplines and writing styles.