Answers

The Security Life Cycle Model is a process that helps in maintaining an acceptable level of security in industrial controls systems and networks. The model begins with deterrence and ends with correction. In your own words, describe this process while incorporating an example (e.g., of how to deter XX and how to prevent XX and so on through the cycle). Your reply should be a minimum 1-2 paragraphs. Can be more also. A paragraph is 3 sentences minimum and 5 sentences maximum.

NIST 800-82 is a guide to Industrial Control Systems (ICS) Security, which SCADA falls under. Select one control, identify whether the control falls under Management, Operational or Technical Controls and explain what this control helps mitigate in a SCADA system? Provide an example of this control in a real world situation (for example you can refer to one of the case-studies and explain how XX control could have mitigated Y). Your reply should be a minimum of 1-2 paragraphs. Can be more also. A paragraph is 3 sentences minimum and 5 sentences maximum.

Leave a Reply

Your email address will not be published. Required fields are marked *

Please read this information on IT sourcing strategies:

Chapter 12.4 ? ?IT Sourcing and Cloud Strategy?
Report on outsourcing and insourcing by Deloitte Consulting describes the sourcing trends that are important for IT.
Find 2 peer-reviewed articles from academic journals on information technology sourcing. Summarize each article and compare and contrast the sourcing approaches in each article. Identify the factors that were important in each sourcing strategy and whether the sourcing decision was strategic for the long term or tactical for the short term.Which strategy did you think was more effective and why? Your paper should be in APA format and 3-4 pages, not counting the title page and reference pages. Make sure you have in-text citations and a reference page.

Leave a Reply

Your email address will not be published. Required fields are marked *

Please read this information on IT sourcing strategies:

Chapter 12.4 ? ?IT Sourcing and Cloud Strategy?
Report on outsourcing and insourcing by Deloitte Consulting describes the sourcing trends that are important for IT.
Find 2 peer-reviewed articles from academic journals on information technology sourcing. Summarize each article and compare and contrast the sourcing approaches in each article. Identify the factors that were important in each sourcing strategy and whether the sourcing decision was strategic for the long term or tactical for the short term.Which strategy did you think was more effective and why? Your paper should be in APA format and 3-4 pages, not counting the title page and reference pages. Make sure you have in-text citations and a reference page.

Leave a Reply

Your email address will not be published. Required fields are marked *