Industrial Control Systems Security Subject

Assignment: Devotional (250 words)
January 14, 2023
Information Systems
January 14, 2023

Industrial Control Systems Security Subject

Network Segmentation ActivityObjectiveThis assignment requires the students to analyze the network diagram for PureLand Wastewater and make specific recommendations to improve network security per requirements below.Instructions for assignment1.       Read chapter 7 in your text: Establishing Secure enclaves2.       Refer to the document titled PureLand Network Diagram.pdf. This is your starting point, and it has some deficiencies in its design that impact the cyber security for PureLand Wastewater. Your job is to use the concepts of establishing secure enclaves to improve the cyber security of PureLand’s network.3.       Define all the 5 enclaves within the PureLand network and fill in the following table defining these enclaves and how they will be monitored in the future state.4.       APA format is compulsory5.       Assignment should be plagiarism free.6.       At least 5 references7.       Proper citations are mandatoryEnclave #1 Name:Enclave CharacteristicDescriptionCommentsFunctional groupCriticality of devicesData flow in/outPerimeter Security Devices recommendedData monitored within enclaveMethods used to monitor enclaveEnclave #2 Name:Enclave CharacteristicDescriptionCommentsFunctional groupCriticality of devicesData flow in/outPerimeter Security Devices recommendedData monitored within enclaveMethods used to monitor enclaveEnclave #3 Name:Enclave CharacteristicDescriptionCommentsFunctional groupCriticality of devicesData flow in/outPerimeter Security Devices recommendedData monitored within enclaveMethods used to monitor enclaveEnclave #4 Name:Enclave CharacteristicDescriptionCommentsFunctional groupCriticality of devicesData flow in/outPerimeter Security Devices recommendedData monitored within enclaveMethods used to monitor enclaveEnclave #5 Name:Enclave CharacteristicDescriptionCommentsFunctional groupCriticality of devicesData flow in/outPerimeter Security Devices recommendedData monitored within enclaveMethods used to monitor enclave

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.