Question

Create an action plan that depicts how to implement at least (5) NIST controls on the...

Create an action plan that depicts how to implement at least (5) NIST controls on the system in a Prison. These controls will be countermeasures against the (3) common ICS/SCADA vulnerabilities related to configurations, applications, protocols, and so forth, identified BELOW Three common vulnerabilities with ICS and SCADA systems:

Buffer Overflows: this is nothing but a common vulnerability and it is caused by software code to overrun the boundary and even override the memory blocks. This kind of vulnerability can cause program crash and even corrupt the data and also it leads to execution of malicious code into the system.

Unauthenticated Protocols: In the ICS and SCADA systems, authentication protocol is used to transfer authenticated data from one entry to another so that it authenticate in between connection. When ICS and SCADA systems lack authentication, any computer can remotely connect to the network and manipulate the data. This is one of the vulnerabilities.

Poor Password policies and management: one of the most critical vulnerabilities is that weak password used for authentication. It is really important that complex passwords must be used for authentication otherwise it can be subjected to attacks or hackings.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Some of the action plans for implementing the NIST Control on the systems are:

1) Targeting the audience for organization and implementing the security planning process.

2) Organizing the documents which would contain a set of steps and activities for developing the security system.

3) Use of systems inventories as well as federal information processing standards

4) Use of major applications, support systems, and minor applications

5) segregate the system security plan responsibilities.

Counter measures for 3 Common ICS/SCADA vulnerabilities are:

1) Buffer overflow: GNU Compiler Collection, LLVM, Microsoft Visual Studio are few of the measures.

2) Un authentication Protocols: Client Side certificates, NTLM etc

3) Poor Password Policies and Management: Multi-factor authentication, discourage sharing, Monitor any UN equality.

Add a comment
Know the answer?
Add Answer to:
Create an action plan that depicts how to implement at least (5) NIST controls on the...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

  • IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is...

    IT's About Business 4.1 The Heartbleed Bug What Is Heartbleed? OpenSSL, an open-source software package, is a popular type of transport layer security (TLS) software (discussed later in this chapter) that secures numerous websites around the world. Web servers use OpenSSL to encrypt sites. Such sites show up in browsers with a “lock” icon and the “https” prefix in the address bar. The encryption protects Internet sites offering banking, shopping, email, and other private communications. Roughly two out of three...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT