Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Cyber Security Improvement Plan

1. Case Learning Objectives:

This assignment provides practical experience developing a plan to improve security on an Industrial Control System based on a completed Cyber Security risk assessment (provided to the student). The following learning objectives are designed to reinforce the unique requirements associated with Industrial Control System Security.

• Document and communicate the current state for security of the ICS

• Provide an overview of the network design including major weaknesses in the physical design and layout of network components with suggested network layout improvements

• Identify the threats and vulnerabilities facing the assets of an Industrial Control System including Advanced Persistent Threats and recommend potential security measures that could have prevented those incidents

• Understand applicable regulations and include provisions for achieving compliance within the plan

• Based on knowledge of recommended security best practices and standards, document and communicate the desired future state for security of the ICS

• Build the plan in a way that incorporates differing levels of security controls depending on risk and criticality of the various devices within the system

• Demonstrate understanding of ICS functionality, network components, and protocols by devising a plan that improves security and concurrently minimizes negative impact to process operations and productivity

• Provide multiple options for security enhancements to management with guidance on trade-offs involved with the different options

• Demonstrate awareness of the unique challenges the exist in securing Industrial Control Systems and customize security plan to address those challenges

2. Assumptions for this case

Build your security improvement plan while taking into account the following assumptions.

• The information provided in the risk assessment is accurate.

• Time Horizon for implementation is 12-24 months.

• DHS Regulated Chemical of Interest is used at the Pressurization Station which is physically isolated from the main plant site at a remote location with good physical security.

• Sample organization is using two ICS standards systems to target Cyber Security improvements:

1. NIST Guide to Industrial Control Systems (ICS) Security as its preferred guidance document.

2. Department of Homeland Security CFATS regulation where chemicals of Interest are used.

• Security on the business network is average for a mid-sized corporation but has much room for improvement and routinely deals with malware infection and security incidents.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92503262
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Management Information System

Security and privacy play an important role within an ea

Security and privacy play an important role within an EA program and its architecture. Please respond to the following in your own words: 1. What is your understanding of the role of security and privacy in the EA progra ...

Develop a work breakdown structure for a online retailer to

Develop a work breakdown structure for a Online retailer to include a paragraph about your structure. Include at least three levels in your diagram. Project: Primarily online retailer. The project will require the accoun ...

Part 11 what are the practical implications in the

Part 1 1) What are the practical implications in the theoretical framework? 2) What are the complexities seen in the organization? Write 300 Words. Include in-text citations and references in APA style formatting. Must h ...

List and describe two forms of organizational changehow

List and describe two forms of organizational change. How does organizational change create business innovation? Give an example. Answer should be 250 to 300 words. with 2 references and in text citation and no plagiaris ...

Case study-assignment prepare an in-depth analysis of four

Case Study-Assignment Prepare an in-depth analysis of four case studies during the semester. Here are some guidelines: • This is an individual assessment, which is a part from your course score. It requires effort and cr ...

Min 150 words do you agree or disagreedefense-in-depth is

Min 150 words ..... Do you agree or disagree Defense-in-depth is important to an enterprise environment. Having layers of security starting with physical and implementing granular security can help in protecting the data ...

Instructionsyou have just been hired as a compliance

Instructions You have just been hired as a compliance officer for your healthcare organization, and you have discovered that the food services department of the organization is not in compliance with state food safety re ...

Question 1 please post the hyperlink to one federal statute

Question : 1. Please post the hyperlink to one federal statute which discusses cybercrime on the internet and summarize in not less than 100 words what that statute accomplishes. 2. Please post the hyperlink to one feder ...

Discussion 1security countermeasures and strategic

Discussion 1. "Security Countermeasures and Strategic Governance" Please respond to the following: • Recommend three countermeasures that could enhance the information security measures of an enterprise. Justify your rec ...

Functions and variable scope please respond to the

"Functions and Variable Scope" Please respond to the following: Functions are used to organize code when programming. All programming languages, including JavaScript have built-in functions that come as part of the langu ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As