Research Illustrated: Mike Gets a Crash Course in Cybersecurity
Mike sits at his computer at work, where he manages software and hardware for a water treatment plan. He has just opened an email with the subject line, “Critical software update for SCADA system. Download now” and clicked on the download link.
He has unknowingly downloaded malware on his computer.
When Mike clicks into the SCADA (Supervisory Control and Data Acquisition) software that manages the water treatment plant pumps, he sees a red alarm over one of the pumps.
“This can’t be right…,” Mike says to himself. He suspects the error is the work of a malicious agent. He immediately approaches his supervisor about the issue.
“Should the lye output have doubled?”
“NO! Shut off the water flow!” his supervisor says.
Mike runs to the pump room and turns the wheel of the lye pump to the off position. As the pump hisses, its pressure dial drops from high to low.
Mike’s supervisor yells out, “Call the LSU Cybersecurity team NOW!”
Mike quickly calls up the LSU Cybersecurity team and reaches an LSU expert.
“We need our system back online ASAP.”
“We’re on it,” the LSU expert says.
Later, Mike has a conference call with the LSU Cybersecurity team. They are providing him with a recap of the incident that affected the water treatment plant’s pump and offering potential solutions.
“The attackers gained access to the software controlling your pumps,” one of the experts says.
“But next time, you’ll be ready,” the Cybersecurity team lead says.
The Cybersecurity team lead walks Mike through how LSU’s cybersecurity offerings, resources, and research will help protect the water treatment plant from future attacks.
The Cybersecurity team lead paints a picture of students sitting around a wrap-around computer screen with tablets and keyboards in front of them. “Our Security Operations Center, staffed by our brightest students, will provide 24/7 virtual monitoring,” he says.
The Cybersecurity team lead then describes how, just as a series of signal fires lit on top of gatehouses along a stone wall walkway can alert a guardian to the approach of an attacker in the far distance, LSU researchers are also developing tools for AI-powered detection of abnormal activity to predict incidents earlier. Mike will be able to receive alerts on his phone about any suspicious activity.
“Launching attack in 3, 2…”
“Detected! What an algorithm.”
The Cybersecurity team lead also shows Mike how memory forensics experts at LSU are developing techniques to detect hidden traces of malicious code and create incident replays, much like forensics investigators in a film darkroom can develop crime scene pictures and piece them together to find a suspect. Memory forensics experts can create incident replays, so we know what happened and how to prevent it in the future, the team lead explains.
“Tricky…”
“But we got you!”
Finally, the Cybersecurity team lead explains how LSU is even training students on bechtop physical models, where they can simulate attacks and develop more resilient systems.
“Geaux Tigers!”


