Industrial control systems security subject

Network Segmentation Activity

Objective

This assignment requires the students to analyze the network diagram for PureLand Wastewater and make specific recommendations to improve network security per requirements below.

Instructions for assignment

1.       Read chapter 7 in your text: Establishing Secure enclaves

2.       Refer to the document titled PureLand Network Diagram.pdf. This is your starting point, and it has some deficiencies in its design that impact the cyber security for PureLand Wastewater. Your job is to use the concepts of establishing secure enclaves to improve the cyber security of PureLand’s network.

3.       Define all the 5 enclaves within the PureLand network and fill in the following table defining these enclaves and how they will be monitored in the future state.

4.       APA format is compulsory

5.       Assignment should be plagiarism free.

6.       At least 5 references

7.       Proper citations are mandatory

Enclave #1 Name:

Enclave Characteristic

Description

Comments

Functional group

 

 

Criticality of devices

 

 

Data flow in/out

 

 

Perimeter Security Devices recommended

 

 

Data monitored within enclave

 

 

Methods used to monitor enclave

 

 

 

 

 

 

Enclave #2 Name:

Enclave Characteristic

Description

Comments

Functional group

 

 

Criticality of devices

 

 

Data flow in/out

 

 

Perimeter Security Devices recommended

 

 

Data monitored within enclave

 

 

Methods used to monitor enclave

 

 

 

Enclave #3 Name:

Enclave Characteristic

Description

Comments

Functional group

 

 

Criticality of devices

 

 

Data flow in/out

 

 

Perimeter Security Devices recommended

 

 

Data monitored within enclave

 

 

Methods used to monitor enclave

 

 

 

 

 

 

Enclave #4 Name:

Enclave Characteristic

Description

Comments

Functional group

 

 

Criticality of devices

 

 

Data flow in/out

 

 

Perimeter Security Devices recommended

 

 

Data monitored within enclave

 

 

Methods used to monitor enclave

 

 

 

Enclave #5 Name:

Enclave Characteristic

Description

Comments

Functional group

 

 

Criticality of devices

 

 

Data flow in/out

 

 

Perimeter Security Devices recommended

 

 

Data monitored within enclave

 

 

Methods used to monitor enclave

 

 

 

 

 

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.