Industrial control systems security subject
Network Segmentation Activity
Objective
This assignment requires the students to analyze the network diagram for PureLand Wastewater and make specific recommendations to improve network security per requirements below.
Instructions for assignment
1. Read chapter 7 in your text: Establishing Secure enclaves
2. Refer to the document titled PureLand Network Diagram.pdf. This is your starting point, and it has some deficiencies in its design that impact the cyber security for PureLand Wastewater. Your job is to use the concepts of establishing secure enclaves to improve the cyber security of PureLand’s network.
3. Define all the 5 enclaves within the PureLand network and fill in the following table defining these enclaves and how they will be monitored in the future state.
4. APA format is compulsory
5. Assignment should be plagiarism free.
6. At least 5 references
7. Proper citations are mandatory
Enclave #1 Name:
Enclave Characteristic |
Description |
Comments |
Functional group |
|
|
Criticality of devices |
|
|
Data flow in/out |
|
|
Perimeter Security Devices recommended |
|
|
Data monitored within enclave |
|
|
Methods used to monitor enclave |
|
|
Enclave #2 Name:
Enclave Characteristic |
Description |
Comments |
Functional group |
|
|
Criticality of devices |
|
|
Data flow in/out |
|
|
Perimeter Security Devices recommended |
|
|
Data monitored within enclave |
|
|
Methods used to monitor enclave |
|
|
Enclave #3 Name:
Enclave Characteristic |
Description |
Comments |
Functional group |
|
|
Criticality of devices |
|
|
Data flow in/out |
|
|
Perimeter Security Devices recommended |
|
|
Data monitored within enclave |
|
|
Methods used to monitor enclave |
|
|
Enclave #4 Name:
Enclave Characteristic |
Description |
Comments |
Functional group |
|
|
Criticality of devices |
|
|
Data flow in/out |
|
|
Perimeter Security Devices recommended |
|
|
Data monitored within enclave |
|
|
Methods used to monitor enclave |
|
|
Enclave #5 Name:
Enclave Characteristic |
Description |
Comments |
Functional group |
|
|
Criticality of devices |
|
|
Data flow in/out |
|
|
Perimeter Security Devices recommended |
|
|
Data monitored within enclave |
|
|
Methods used to monitor enclave |
|
|
Leave a Reply
Want to join the discussion?Feel free to contribute!