Module 3: Technologies

Module 3 Hands-on Activity

Overview

Explore the interactive graphic Secure Architecture Design. This secure design is the result of an evolutionary process of technology advancement and increasing cyber vulnerability presented in the Recommended Practice document Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

Hands-on Activity Objectives

Module 3 Learning Objective # Revised Bloom’s Taxonomy Hands-On Activity Objectives
3.4 Understand Discuss the unique challenges/characteristics of devices associated with industrial control systems.
3.5 Understand Explain how existing network administration principles can be applied to secure CIKR.

Assignment

Examine an enterprise diagram for an overview of a network located at Secure Architecture Design. Hover over the various areas of the Secure Architecture Design graphic and click inside the box for additional information associated with the system elements.

After downloading and reading Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies (see Required Reading), navigate through the embedded description in the Secure Architectural Design diagram.

Write a short paper describing the following recommended practices for improving industrial control systems cybersecurity with Defense-In-Depth Strategies for your team’s fictitious sector-based company:

  • Security Challenges within Industrial Control Systems
  • Isolating and Protecting Assets: Defense-in-Depth Strategies
  • Recommendations and Countermeasures

Assignment diagram

Grading Criteria Rubric

  • Content
  • References
  • Use of American Psychological Association (APA) style in writing the assignment

Grade points: 100

License

Icon for the Creative Commons Attribution 4.0 International License

Critical Infrastructure Systems by NCyTE Center is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.

Share This Book