Module 3: Technologies

Description

A number of different networking and SCADA protocols, hardware, and security devices are available to protect a network and the devices on that network. This module addresses the various mechanisms for employing hardware, protocols, and technologies with basic protections in infrastructure and network design. It also identifies methods for enhancing the security of an enterprise network through the positioning of certain pieces of hardware, protocol, and network equipment.

Objectives

# Revised Bloom’s Taxonomy Objective Slide # Act. 1 Team Act Assess Ques #
3.1 Understand Identify the major components of an OT/ICS network and how IT differs from OT systems. 4 – 10 X 1, 2, 4, 7, 9 – 16
3.2 Understand Identify the functions of common communications protocols and network standards used within CI. 11-12 X 5, 8
3.3 Understand Identify the differences between IPv4 and IPv6. 13 3
3.4 Understand Discuss the unique challenges/characteristics of devices associated with industrial control systems. 14 – 16 X 17
3.5 Understand Explain how existing network administration principles can be applied to secure CIKR. 18 – 19 X 18, 19

License

Icon for the Creative Commons Attribution 4.0 International License

Critical Infrastructure Systems by NCyTE Center is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.

Share This Book