This assignment is a part of your overall final project. Please make sure to incorporate this assignment to your final project; reference to Week 1 Final Project Template.Apply ICS Security Best Practices1. NIST 800-82, Industrial Control System Security, http://csrc.nist.gov/publications/drafts/800-82r2/…2. Identify unremediated risks and choose risk strategy: Accept risk, avoid risk, mitigate risk, share risk, transfer risk, combination. Reference: NIST 800-37, Guide for Applying the Risk Management Framework to Federal Information Systems, http://nvlpubs.nist.gov/nistpubs/SpecialPublicatio…Identify Vulnerability Continuous Monitoring Strategy 1. Examples:a. Nessus – Bandolier modules.b. Metasploit – ICS exploits.c. Snortd. Nmap – Identify ICS “friendly” scans.2. Are these IA certified tools? How so?a. For example:i. NIAP: https://www.niap-ccevs.org/CCEVS_Products/pcl.cfmii. Common Criteria: https://www.commoncriteriaportal.org/products/b. For example: Are these tools SCAP-compliant?3. Create script rules for baselining each ICS system. a. For example scripts rules should audit: i. Installed programs. ii. Users, groups. iii. Shares. iv. Services. v. Processes. vi. Etc.
Best Pratices and Monitoring Strategy
How it works
- Paste your instructions in the instructions box. You can also attach an instructions file
- Select the writer category, deadline, education level and review the instructions
- Make a payment for the order to be assignment to a writer
- Download the paper after the writer uploads it
Will the writer plagiarize my essay?
You will get a plagiarism-free paper and you can get an originality report upon request.
Is this service safe?
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Recent Comments