Module 3: Technologies
Description
A number of different networking and SCADA protocols, hardware, and security devices are available to protect a network and the devices on that network. This module addresses the various mechanisms for employing hardware, protocols, and technologies with basic protections in infrastructure and network design. It also identifies methods for enhancing the security of an enterprise network through the positioning of certain pieces of hardware, protocol, and network equipment.
Objectives
# | Revised Bloom’s Taxonomy | Objective | Slide # | Act. 1 | Team Act | Assess Ques # |
---|---|---|---|---|---|---|
3.1 | Understand | Identify the major components of an OT/ICS network and how IT differs from OT systems. | 4 – 10 | X | 1, 2, 4, 7, 9 – 16 | |
3.2 | Understand | Identify the functions of common communications protocols and network standards used within CI. | 11-12 | X | 5, 8 | |
3.3 | Understand | Identify the differences between IPv4 and IPv6. | 13 | 3 | ||
3.4 | Understand | Discuss the unique challenges/characteristics of devices associated with industrial control systems. | 14 – 16 | X | 17 | |
3.5 | Understand | Explain how existing network administration principles can be applied to secure CIKR. | 18 – 19 | X | 18, 19 |