Scada cyber security

In the Ch. 11 folder of the Student Sample Programs, you will find a database file named PopulationDB.mdf. The database has a table named city. The city table has the following colums.
August 7, 2017
socioeconomic status
August 7, 2017
Show all

Scada cyber security

question 1

The Security Life Cycle Model is a process that helps in maintaining an acceptable level of

security in industrial controls systems and networks.  The model begins with deterrence and ends

with correction. In your own words, describe this process while incorporating an example (e.g.,

of how to deter XX and how to prevent XX and so on through the cycle).  Your reply should be a

minimum of 3 paragraph. A paragraph is 3 sentences minimum and 5 sentences maximum. It is

 question 2

NIST 800-82 is a guide to Industrial Control Systems (ICS) Security, which SCADA falls

under. Select one control, identify whether the control falls under Management, Operational

or  Technical Controls and explain what this control helps mitigate in a SCADA system?

Provide an example of this control in a real world situation (for example you can refer to one

of the case- studies and explain how XX control could have mitigated Y).  Your reply should

be a minimum of 3  paragraph. A paragraph is 3 sentences minimum and 5 sentences

maximum. 

due

04/26/2017

no plagarism pls


Leave a Reply

Your email address will not be published. Required fields are marked *