Best-Pratices-and-Monitoring-Strategy

We can write your essays! Let our essay writing experts help you get that A in your next essay. Place your order today, and you will enjoy it. No plagiarism.


Order a Similar Paper Order a Different Paper

This assignment is a part of your overall final project. Please make sure to incorporate this assignment to your final project; reference to Week 1 Final Project Template.

Apply ICS Security Best Practices

1. NIST 800-82, Industrial Control System Security, http://csrc.nist.gov/publications/drafts/800-82r2/…

2. Identify unremediated risks and choose risk strategy: Accept risk, avoid risk, mitigate risk, share risk, transfer risk, combination.

Reference: NIST 800-37, Guide for Applying the Risk Management Framework to Federal Information Systems, http://nvlpubs.nist.gov/nistpubs/SpecialPublicatio…

Identify Vulnerability Continuous Monitoring Strategy

1. Examples:

a. Nessus – Bandolier modules.

b. Metasploit – ICS exploits.

c. Snort

d. Nmap – Identify ICS “friendly” scans.

2. Are these IA certified tools? How so?

a. For example:

i. NIAP: https://www.niap-ccevs.org/CCEVS_Products/pcl.cfm

ii. Common Criteria: https://www.commoncriteriaportal.org/products/

b. For example: Are these tools SCAP-compliant?

3. Create script rules for baselining each ICS system.

a. For example scripts rules should audit:

i. Installed programs.

ii. Users, groups.

iii. Shares.

iv. Services.

v. Processes.

vi. Etc.

Writerbay.net

Everyone needs a little help with academic work from time to time. Hire the best essay writing professionals working for us today!

Get a 15% discount for your first order


Order a Similar Paper Order a Different Paper