Question

In: Computer Science

Match each component with proposed strategies/elements of a framework for Defense-in-Depth security. Word bank: Risk management...

Match each component with proposed strategies/elements of a framework for Defense-in-Depth security.

Word bank:

Risk management program

Cyber security architecture

Physical security

ICS Network Architecture

ICS Network Perimeter Security

Host security

Security monitoring

Vendor management

The human element

Defense in Depth Strategy Elements

1.

  • Standards/ Recommendations
  • Policy
  • Procedures

2.

  • Patch and Vulnerability Management
  • Field Devices
  • Virtual Machines

3.

  • Common Architectural Zones
  • Demilitarized Zones (DMZ)
  • Virtual LANs

4.

  • Firewalls/One-Way Diodes
  • Remote Access & Authentication
  • Jump Servers/Hosts

5.

  • Field Electronics Locked Down
  • Control Center Access Controls
  • Remote Site Video, Access Controls, Barriers

6.

  • Identify Threats
  • Characterize Risk
  • Maintain Asset Inventory

7.

  • Intrusion Detection Systems
  • Security Audit Logging
  • Security Incident and Event Monitoring

8.

  • Policies
  • Procedures
  • Training and Awareness

9.

  • Supply Chain Management
  • Managed Services/Outsourcing
  • Leveraging Cloud Services

Solutions

Expert Solution

Defense in Depth Strategy Elements

1.Risk management program

  • Standards/ Recommendations
  • Policy
  • Procedures

2. ICS Network Perimeter Security

  • Patch and Vulnerability Management
  • Field Devices
  • Virtual Machines

3.Cyber security architecture

  • Common Architectural Zones
  • Demilitarized Zones (DMZ)
  • Virtual LANs

4. ICS Network Architecture

  • Firewalls/One-Way Diodes
  • Remote Access & Authentication
  • Jump Servers/Hosts

5.Physical security

  • Field Electronics Locked Down
  • Control Center Access Controls
  • Remote Site Video, Access Controls, Barriers

6.Host security

  • Identify Threats
  • Characterize Risk
  • Maintain Asset Inventory

7.Security monitoring

  • Intrusion Detection Systems
  • Security Audit Logging
  • Security Incident and Event Monitoring

8.The human element

  • Policies
  • Procedures
  • Training and Awareness

9. Vendor Management

  • Supply Chain Management
  • Managed Services/Outsourcing
  • Leveraging Cloud Services

Related Solutions

Match each component with proposed strategies/elements of a framework for Defense-in-Depth security. Word bank: Risk management...
Match each component with proposed strategies/elements of a framework for Defense-in-Depth security. Word bank: Risk management program Cyber security architecture Physical security ICS Network Architecture ICS Network Perimeter Security Host security Security monitoring Vendor management The human element Defense in Depth Strategy Elements 1. Standards/ Recommendations Policy Procedures 2. Patch and Vulnerability Management Field Devices Virtual Machines 3. Common Architectural Zones Demilitarized Zones (DMZ) Virtual LANs 4. Firewalls/One-Way Diodes Remote Access & Authentication Jump Servers/Hosts 5. Field Electronics Locked Down...
What risk-management strategies can an exporter/follow? Explain each strategy's advantages and disadvantages from the perspective of...
What risk-management strategies can an exporter/follow? Explain each strategy's advantages and disadvantages from the perspective of a small exporter include what risk managment strategy you would follow for your product that is skin care an countries involved. UK country.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT