UKRAINE POWERPLANT In ICS/SCADA System
Part 1 : Research about involving SCADA….which is UKRAINE POWERPLANT ATTACK
Need 2 pages Research with Reference APA format
Part 2 : need 3 page Description of Industry
Industrial Control System Processes Employed
Part 3 ; Need 3 Page
This assignment is a part of your overall final project. Please make sure to incorporate this assignment to your final project; reference to Week 1 Final Project Template.
Profile ICS Devices
For example, 80, 443, etc.
http://www.digitalbond.com/tools/the-rack/control-system-port-list/
For example, SMTP, SNMP, DNP3, Modbus, Fieldbus, Ethernet, etc.
For example, serial, RJ45, USB, parallel, etc.
http://www.digitalbond.com/tools/the-rack/control-system-port-list/
Research the manufacturer’s information on the device. Look for default account information to login with.
Check “Default Password List” for an entry: http://www.defaultpassword.com/
Research manufacturer’s information on the device and document services running.
Research manufacturer’s website for the device and locate information on how the device authenticates users.
Research manufacturer’s website for the device and locate information about encryption. For example, does the device use encrypted connections? Is the back-end database encrypted? What type of encryption does it use? Is public/private key encryption like RSA?
Research manufacturer’s website for the device and locate information about logging. Answer questions like is logging enabled? Are logs stored locally or remotely?
Does the manufacturer have any security related documentation not provided above that would be of use?
Part 4 : Need 2 Page
Identify, Measure, and Manage Risks
Risk is a function of M, AV, T, and V:
R = f (M, AV, T, V)
R – risk, M – mission importance, AV – asset values, T – threats, V – vulnerabilities
“Why”: why do you need and want to solve the problem?
“How”: how do you economically solve it?
Identify Security Controls
Reference either ICS CERT CSET or NIST 800-53, Security and Privacy Controls for Federal Information Systems and Organizations,
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf
Part 5 : Need 3 Page
Apply ICS Security Best Practices
Reference: NIST 800-37, Guide for Applying the Risk Management Framework to Federal Information Systems, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r1.pdf
Identify Vulnerability Continuous Monitoring Strategy
iii. Shares.
Part 6 need 2 pages
Please revise your rough draft to address three attributes: a) “What”: what is the problem/challenge in managing risks and auditing the ICS, b) “Why”: as an ICS/ SCADA Information Assurance expert, why do you need and want to solve the problem, and c) “How”: how do you economically solve it?
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more