Description
ICS Security Review Discussion: Research and report to the class on one of the following security best practices used to secure Industrial Control Systems: vulnerability management, Patch management, establishing secure enclaves, identification of critical systems, defense in depth, access control, configuration management.
Please cover in your post the following points:
- Describe what the process does.
- Discuss whether you think this process is a good fit for securing ICS' and why.
Note: use these reference for work
Knapp, & Langill. (2015). Industrial Network Security :Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems 2nd Ed. New York: Elsevier Inc.
Explanation & Answer
Attached.
Surname:1
Student’ Name
Tutor
Course Number
Date
Discussion Questions
In the current economic and industrial scenario, only those organizations can sustain who
have highly efficient and most productive internal control system. Internal Control System (ICS)
is the main thing that associated with every single organization. Therefore, companies have to
apply these concepts for the best of their knowledge and management. ICS is an efficient tool
that manages the operations and increases the factor of transparency in an efficient manner. Most
of the organizations throughout the world are now using th...