Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1 . Describe the importance of security architecture and strategy. 4 . Identify how the NIST CSF applies to offensive cybersecurity. Safeguarding any network starts

1. Describe the importance of security architecture and strategy.
4. Identify how the NIST CSF applies to offensive cybersecurity.
Safeguarding any network starts with knowing every user and device connected to the infrastructure and the nature of data being accessed. Over just the last few years, the number and types of devices connected to home and work networks have increased substantially. One of the primary reasons behind this increase is the wide adoption of the Internet of Things (IoT) and the internet accessibility of operational technology (OT).
Not too long ago, personal access to the internet was limited to desktops and laptops. However, now with IoT, practically any device can be connected to the internet. Some examples of this include smart TVs, home appliances, baby monitors, doorbells, and health trackers. There is no question that the adoption of loT devices has made a substantial enhancement in people's daily lives by providing unprecedented levels of convenience and insights. Similarly, convergence is happening between traditional information technology (IT) and OT. According to Gartner B OT is "hardware and software that detects or causes a change, through the direct monitoring and/or control of industrial equipment, assets, processes, and events" (Gartner, n.d.).
Our world depends on OT and related industrial systems for the reliable and stable delivery of essential services, such as power, water, and transportation. Furthermore, for years, humans manually managed and monitored these critical systems in an air-gapped environment with no access to the internet. However, today, ICS are being brought online at an alarming rate to deliver smart analytics, advanced capabilities, and cost savings.
For this assignment, apply what you have learned about the NIST CSF to an IoT or OT example. As covered in the video, NIST has recently published additional control frameworks that focus on risk management and responding to risk in the OT, ICS, and loT. Review the resources to these additional NIST controls and answer the following:
. Choose one of the additional NIST frameworks and provide its overview, including its purpose, target audience, and importance.
.
Explain how your selected framework is helpful to an organization. How does it support the NIST CSF's five
functions: identify, protect, detect, respond, and recover?
Highlight the main takeaways that you have from reviewing your specific framework.
Resources
Guide to Industrial Control Systems (ICS) Security (NIST SP 800-82) by NIST
Industrial Automation and Control Systems Security (ISA99) E by ISA
Rounding Up Your loT Security Requirements: Draft NIST Guidance for Federal Agencies by Katerina Megas

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Systems Introduction To Databases And Data Warehouses

Authors: Nenad Jukic, Susan Vrbsky, Svetlozar Nestorov

1st Edition

1943153191, 978-1943153190

More Books

Students also viewed these Databases questions