Answered step by step
Verified Expert Solution
Question
1 Approved Answer
OVERVIEW Explore the interactive graphic Secure Architecture Design. This secure design is the result of an evolutionary process of technology advancement and increasing cyber vulnerability
OVERVIEW Explore the interactive graphic Secure Architecture Design. This secure design is the result of an evolutionary process of technology advancement and increasing cyber vulnerability presented in the Recommended Practice document Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies. Hands-on Activity Objectives
- • List several types of networking hardware and explain the purpose of each.
- • List and describe the functions of common communications protocols and network standards used within CI.
- • Explain how existing network administration principles can be applied to secure CIKR.
- • Identify new types of network applications and how they can be secured.
- ASSIGNMENT Use the ICS-Cert learning portal to examine an enterprise diagram for an overview of a network. If you are not registered yet, please register. Hover over the various areas of the Secure Architecture Design graphic, located at https://ics-cert.us-cert.gov/Secure-Architecture-Design. Click inside the box for additional information associated with the system elements. After downloading and reading Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies (see Required Reading), navigate through the embedded description in the Secure Architectural Design diagram. Write a short paper describing the following recommended practices for improving industrial control systems cybersecurity with Defense-In-Depth Strategies for a fictitious sector-based company: • Security Challenges within Industrial Control Systems
- • Isolating and Protecting Assets: Defense-in-Depth Strategies • Recommendations and Countermeasures GRADING CRITERIA RUBRIC • Content • Evidence of research • References • Use of American Psychological Association (APA) style in writing the assignment Grade points: 100
Step by Step Solution
★★★★★
3.41 Rating (145 Votes )
There are 3 Steps involved in it
Step: 1
There are many types of networking hardware available each with its own specific purpose For example routers direct traffic between different networks ...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started