Identification should include
- types of water sources
- irrigation
- municipal
- reservoir/dam operation
- freshwater supply
- ground water/aquifers
- surface water
- types of contaminants
- sources of disruption
- results of overuse.
Process/Skill Questions:
- How can cyberterrorism be used to disrupt the water supply?
- Where are the vulnerabilities in water sources?
- What are some U.S. cities that depend on one major source of water?
- How is water a potential threat to a nation’s security?
- How is the competition for limited water supplies a risk for cybersecurity in water systems, especially agriculture use of limited water supplies?