SlideShare a Scribd company logo
1 of 16
it can be in 6 to 8 pages of project it should be inclide
1. Cover Page
2. Table of content
3. content
4. REFERECNCE
5. on content it should be include SCADA NETWORK
TYPOGRAPHY & FLOW DIAGRAM
along with sub headings
it should be in above following
ICS Architecture Final Project Template
SEC6082
Your Name
Table of Contents
Executive Summary
...............................................................................................
.........................
X
ICS Industry Architecture Being Designed
...................................................................................
X
Overview
...............................................................................................
.............................
X
Statement of Need
...............................................................................................
...............
X
Detailed Description
...............................................................................................
............
X
ICS Network Architecture
...............................................................................................
..............
X
Physical and Logical Designs
.............................................................................................
X
Protocols
...............................................................................................
..............................
X
Devices
...............................................................................................
................................
X
ICS Security Architecture
...............................................................................................
...............
X
Device Security Configuration
...........................................................................................
X
Device Security Configuration
...........................................................................................
X
Device Security Configuration
...........................................................................................
X
Etc
...............................................................................................
........................................
X
Appendix
...............................................................................................
.........................................
X
*
Comprehensive Network Map
..........................................................................................
X
Example: Device Data Flows
.............................................................................................
X
Example: Security Design Documents
...............................................................................
X
Example: Intrusion Detection System
................................................................................
X
Example: Honeypot Configuration
.....................................................................................
X
*
The comprehensive network map must include all devices and
communication protocols.
List of Tables and Figures
Figure 1.
Example: Total
Network Design
.....................................................................................
X
Figure 2.
Example:
Device Data Flow
............................................................................................
X
Figure 3. Example: Intrusion Detection System
.............................................................................
X
Figure 4. Example: Honeypot Configuration
.................................................................................
X
Executive Summary
An Executive Summary provides a brief overview for C-level
Executives who only need to know what the material is about,
not the details of the material.
Give a brief summary, one page or less, of what this project is
about.
ICS Industry Architecture Being Designed
This is arguably the most important part of the ICS architecture
project.
The logistical work done during this phase makes it possible to
architect a successful ICS network.
The origins of all problems experienced during the other phases
can usually be tracked back to a lack of planning and
understanding of your project during this phase.
You will describe the industry you are architecting this ICS
network for.
1. Overview
Begin describing the types of network designs commonly used
to architect this network.
2. Statement of Need
Discuss the network needs of this architectural project.
Your ICS network must include a SCADA network controlling
at least two remote DCS networks.
The SCADA network must securely share data with a traditional
business IT network.
3. Detailed Description
Now that you know the types of network commonly found and
used in this industry and you know the particular needs of this
architectural project, address how you will design this ICS
network.
ICS Network Architecture
Provide a brief description of what will occur during this phase.
For example: This is the phase where you will describe the
physical and logical design of your network, etc.
This phase has three sections: Physical and Logical Designs;
Protocols; and Devices.
1. Physical and Logical Designs
There are many physical and logical network designs possible.
ICS networks usually have more than one physical and logical
network solution.
Describe your physical and logical ICS network designs here.
Include Visios or Excel designs to graphically illustrate your
designs.
A block of words is provided below to jog your mind:
Ring, star, bus, mesh, twisted pair, coax, fiber, microwave,
satellite.
2. Protocols
This section is where you will document and describe the
protocols in use, where, and why.
The protocols listed should be represented in your network
diagram(s).
A block of words is provided below to jog your mind:
DNP3, Fieldbus, Modbus, Profibus, Ethernet.
3. Devices
A list of devices should be provided with as much information
as possible.
Identify the open ports and services running on each.
List them here and explain why you’ve chosen them.
All devices listed should appear in your network diagram(s).
Follow these steps below:
a.
Identify the device.
b.
Identify what the device does.
c.
Identify the open ports.
d.
Identify the services running on these ports.
Example devices include, but are not limited to: Router,
firewall, IDS/IPS, Honeypot, Historian, PLC, RTU, IED, data
acquisition server, HMI, protocol gateway, SCADA master
station, sensors.
ICS Security Architecture
List each device you previously documented in “3. Devices” but
this time annotate how they will be secured.
This will require you to research vendor documentation,
industry best practices, and other authoritative sources.
Identify known weaknesses of the devices and how you will
mitigate them.
Reference
Appendix
ICS Architecture Final Project Template
SEC6082
Your Name
Table of Contents
Executive Summary
...............................................................................................
.........................
X
ICS Industry Architecture Being Designed
...................................................................................
X
Overview
...............................................................................................
.............................
X
Statement of Need
...............................................................................................
...............
X
Detailed Description
...............................................................................................
............
X
ICS Network Architecture
...............................................................................................
..............
X
Physical and Logical Designs
.............................................................................................
X
Protocols
...............................................................................................
..............................
X
Devices
...............................................................................................
................................
X
ICS Security Architecture
...............................................................................................
...............
X
Device Security Configuration
...........................................................................................
X
Device Security Configuration
...........................................................................................
X
Device Security Configuration
...........................................................................................
X
Etc
...............................................................................................
........................................
X
Appendix
...............................................................................................
.........................................
X
*
Comprehensive Network Map
..........................................................................................
X
Example: Device Data Flows
.................................................................................. ...........
X
Example: Security Design Documents
...............................................................................
X
Example: Intrusion Detection System
................................................................................
X
Example: Honeypot Configuration
.....................................................................................
X
*
The comprehensive network map must include all devices and
communication protocols.
List of Tables and Figures
Figure 1.
Example: Total
Network Design
.....................................................................................
X
Figure 2.
Example:
Device Data Flow
............................................................................................
X
Figure 3. Example: Intrusion Detection System
.............................................................................
X
Figure 4. Example: Honeypot Configuration
.................................................................................
X
Executive Summary
An Executive Summary provides a brief overview for C-level
Executives who only need to know what the material is about,
not the details of the material.
Give a brief summary, one page or less, of what this project is
about.
ICS Industry Architecture Being Designed
This is arguably the most important part of the ICS architecture
project.
The logistical work done during this phase makes it possible to
architect a successful ICS network.
The origins of all problems experienced during the other phases
can usually be tracked back to a lack of planning and
understanding of your project during this phase.
You will describe the industry you are architecting this ICS
network for.
1. Overview
Begin describing the types of network designs commonly used
to architect this network.
2. Statement of Need
Discuss the network needs of this architectural project.
Your ICS network must include a SCADA network controlling
at least two remote DCS networks.
The SCADA network must securely share data with a traditional
business IT network.
3. Detailed Description
Now that you know the types of network commonly found and
used in this industry and you know the particular needs of this
architectural project, address how you will design this ICS
network.
ICS Network Architecture
Provide a brief description of what will occur during this phase.
For example: This is the phase where you will describe the
physical and logical design of your network, etc.
This phase has three sections: Physical and Logical Designs;
Protocols; and Devices.
1. Physical and Logical Designs
There are many physical and logical network designs possible.
ICS networks usually have more than one physical and logical
network solution.
Describe your physical and logical ICS network designs here.
Include Visios or Excel designs to graphically illustrate your
designs.
A block of words is provided below to jog your mind:
Ring, star, bus, mesh, twisted pair, coax, fiber, microwave,
satellite.
2. Protocols
This section is where you will document and describe the
protocols in use, where, and why.
The protocols listed should be represented in your network
diagram(s).
A block of words is provided below to jog your mind:
DNP3, Fieldbus, Modbus, Profibus, Ethernet.
3. Devices
A list of devices should be provided with as much information
as possible.
Identify the open ports and services running on each.
List them here and explain why you’ve chosen them.
All devices listed should appear in your network diagram(s).
Follow these steps below:
a.
Identify the device.
b.
Identify what the device does.
c.
Identify the open ports.
d.
Identify the services running on these ports.
Example devices include, but are not limited to: Router,
firewall, IDS/IPS, Honeypot, Historian, PLC, RTU, IED, data
acquisition server, HMI, protocol gateway, SCADA master
station, sensors.
ICS Security Architecture
List each device you previously documented in “3. Devices” but
this time annotate how they will be secured.
This will require you to research vendor documentation,
industry best practices, and other authoritative sources.
Identify known weaknesses of the devices and how you will
mitigate them.
Reference
Appendix

More Related Content

Similar to it can be in 6 to 8 pages of project  it should be inclide1. Cover.docx

brocade-data-center-fabric-architectures-wp
brocade-data-center-fabric-architectures-wpbrocade-data-center-fabric-architectures-wp
brocade-data-center-fabric-architectures-wpAnuj Dewangan
 
CIS 534 Education Specialist / snaptutorial.com
 CIS 534 Education Specialist / snaptutorial.com CIS 534 Education Specialist / snaptutorial.com
CIS 534 Education Specialist / snaptutorial.comstevesonz129
 
Cis 534 Education Organization -- snaptutorial.com
Cis 534   Education Organization -- snaptutorial.comCis 534   Education Organization -- snaptutorial.com
Cis 534 Education Organization -- snaptutorial.comDavisMurphyB71
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System SecurityAmber Wheeler
 
Design & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOTDesign & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOTIRJET Journal
 
The Intersection of Identity Management and Cloud Computing
The Intersection of Identity Management and Cloud ComputingThe Intersection of Identity Management and Cloud Computing
The Intersection of Identity Management and Cloud ComputingHitachi ID Systems, Inc.
 
Network Design for a Small & Medium Enterprise
Network Design for a Small & Medium EnterpriseNetwork Design for a Small & Medium Enterprise
Network Design for a Small & Medium EnterpriseThamalsha Wijayarathna
 
Cis 534 Technology levels--snaptutorial.com
Cis 534 Technology levels--snaptutorial.comCis 534 Technology levels--snaptutorial.com
Cis 534 Technology levels--snaptutorial.comsholingarjosh62
 
Cis 534 Enthusiastic Study / snaptutorial.com
Cis 534 Enthusiastic Study / snaptutorial.comCis 534 Enthusiastic Study / snaptutorial.com
Cis 534 Enthusiastic Study / snaptutorial.comStephenson05
 
A Survey on System-On-Chip Bus Protocols
A Survey on System-On-Chip Bus ProtocolsA Survey on System-On-Chip Bus Protocols
A Survey on System-On-Chip Bus ProtocolsIRJET Journal
 
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0Protect724
 
153285580 lld-template
153285580 lld-template153285580 lld-template
153285580 lld-templatejax100
 
Cisco 3600 access point datasheet
Cisco 3600 access point datasheetCisco 3600 access point datasheet
Cisco 3600 access point datasheetAmy Huang
 
#VirtualDesignMaster 3 Challenge 3 – James Brown
#VirtualDesignMaster 3 Challenge 3 – James Brown#VirtualDesignMaster 3 Challenge 3 – James Brown
#VirtualDesignMaster 3 Challenge 3 – James Brownvdmchallenge
 
INOVA GIS Platform - TeleCAD-GIS & IGS (2018)
INOVA GIS Platform - TeleCAD-GIS & IGS (2018)INOVA GIS Platform - TeleCAD-GIS & IGS (2018)
INOVA GIS Platform - TeleCAD-GIS & IGS (2018)Maksim Sestic
 
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORSA COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORSaciijournal
 

Similar to it can be in 6 to 8 pages of project  it should be inclide1. Cover.docx (20)

brocade-data-center-fabric-architectures-wp
brocade-data-center-fabric-architectures-wpbrocade-data-center-fabric-architectures-wp
brocade-data-center-fabric-architectures-wp
 
CIS 534 Education Specialist / snaptutorial.com
 CIS 534 Education Specialist / snaptutorial.com CIS 534 Education Specialist / snaptutorial.com
CIS 534 Education Specialist / snaptutorial.com
 
Cis 534 Education Organization -- snaptutorial.com
Cis 534   Education Organization -- snaptutorial.comCis 534   Education Organization -- snaptutorial.com
Cis 534 Education Organization -- snaptutorial.com
 
Application Of An Operating System Security
Application Of An Operating System SecurityApplication Of An Operating System Security
Application Of An Operating System Security
 
Design & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOTDesign & Implementation Of Fault Identification In Underground Cables Using IOT
Design & Implementation Of Fault Identification In Underground Cables Using IOT
 
The Intersection of Identity Management and Cloud Computing
The Intersection of Identity Management and Cloud ComputingThe Intersection of Identity Management and Cloud Computing
The Intersection of Identity Management and Cloud Computing
 
Network Design for a Small & Medium Enterprise
Network Design for a Small & Medium EnterpriseNetwork Design for a Small & Medium Enterprise
Network Design for a Small & Medium Enterprise
 
Cis 534 Technology levels--snaptutorial.com
Cis 534 Technology levels--snaptutorial.comCis 534 Technology levels--snaptutorial.com
Cis 534 Technology levels--snaptutorial.com
 
Cis 534 Enthusiastic Study / snaptutorial.com
Cis 534 Enthusiastic Study / snaptutorial.comCis 534 Enthusiastic Study / snaptutorial.com
Cis 534 Enthusiastic Study / snaptutorial.com
 
A Survey on System-On-Chip Bus Protocols
A Survey on System-On-Chip Bus ProtocolsA Survey on System-On-Chip Bus Protocols
A Survey on System-On-Chip Bus Protocols
 
Cisco project ideas
Cisco   project ideasCisco   project ideas
Cisco project ideas
 
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0
Standard Content Guide for ArcSight Express w/ CORR-Engine v3.0
 
153285580 lld-template
153285580 lld-template153285580 lld-template
153285580 lld-template
 
Cisco 3600 access point datasheet
Cisco 3600 access point datasheetCisco 3600 access point datasheet
Cisco 3600 access point datasheet
 
Black_Box_Cabling_Guide.pdf
Black_Box_Cabling_Guide.pdfBlack_Box_Cabling_Guide.pdf
Black_Box_Cabling_Guide.pdf
 
Ip san-best-practices-en
Ip san-best-practices-enIp san-best-practices-en
Ip san-best-practices-en
 
Broadband Technology
Broadband TechnologyBroadband Technology
Broadband Technology
 
#VirtualDesignMaster 3 Challenge 3 – James Brown
#VirtualDesignMaster 3 Challenge 3 – James Brown#VirtualDesignMaster 3 Challenge 3 – James Brown
#VirtualDesignMaster 3 Challenge 3 – James Brown
 
INOVA GIS Platform - TeleCAD-GIS & IGS (2018)
INOVA GIS Platform - TeleCAD-GIS & IGS (2018)INOVA GIS Platform - TeleCAD-GIS & IGS (2018)
INOVA GIS Platform - TeleCAD-GIS & IGS (2018)
 
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORSA COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
A COMPARISON OF FOUR SERIES OF CISCO NETWORK PROCESSORS
 

More from BHANU281672

652020 Originality Reporthttpsblackboard.nec.eduweba.docx
652020 Originality Reporthttpsblackboard.nec.eduweba.docx652020 Originality Reporthttpsblackboard.nec.eduweba.docx
652020 Originality Reporthttpsblackboard.nec.eduweba.docxBHANU281672
 
61Identify the case study you selected. Explain whether the.docx
61Identify the case study you selected. Explain whether the.docx61Identify the case study you selected. Explain whether the.docx
61Identify the case study you selected. Explain whether the.docxBHANU281672
 
60CHAPTER THREEconsistent with the so-called performative app.docx
60CHAPTER THREEconsistent with the so-called performative app.docx60CHAPTER THREEconsistent with the so-called performative app.docx
60CHAPTER THREEconsistent with the so-called performative app.docxBHANU281672
 
6 pagesThe following sections are in the final consulting .docx
6 pagesThe following sections are in the final consulting .docx6 pagesThe following sections are in the final consulting .docx
6 pagesThe following sections are in the final consulting .docxBHANU281672
 
600 words needed1. What do we mean by the New Public Administr.docx
600 words needed1. What do we mean by the New Public Administr.docx600 words needed1. What do we mean by the New Public Administr.docx
600 words needed1. What do we mean by the New Public Administr.docxBHANU281672
 
6 peer responses due in 24 hours Each set of 2 responses wil.docx
6 peer responses due in 24 hours Each set of 2 responses wil.docx6 peer responses due in 24 hours Each set of 2 responses wil.docx
6 peer responses due in 24 hours Each set of 2 responses wil.docxBHANU281672
 
6 page paper onWhat is second language acquisition and why is .docx
6 page paper onWhat is second language acquisition and why is .docx6 page paper onWhat is second language acquisition and why is .docx
6 page paper onWhat is second language acquisition and why is .docxBHANU281672
 
600 Words1) Specify some of the ways in which human resource m.docx
600 Words1) Specify some of the ways in which human resource m.docx600 Words1) Specify some of the ways in which human resource m.docx
600 Words1) Specify some of the ways in which human resource m.docxBHANU281672
 
612020 Originality Reporthttpsucumberlands.blackboard.docx
612020 Originality Reporthttpsucumberlands.blackboard.docx612020 Originality Reporthttpsucumberlands.blackboard.docx
612020 Originality Reporthttpsucumberlands.blackboard.docxBHANU281672
 
61520, 256 PMGlobal Innovation and Intellectual Property.docx
61520, 256 PMGlobal Innovation and Intellectual Property.docx61520, 256 PMGlobal Innovation and Intellectual Property.docx
61520, 256 PMGlobal Innovation and Intellectual Property.docxBHANU281672
 
6 Developing Strategic and Operational PlansIngram Publish.docx
6 Developing Strategic and Operational PlansIngram Publish.docx6 Developing Strategic and Operational PlansIngram Publish.docx
6 Developing Strategic and Operational PlansIngram Publish.docxBHANU281672
 
6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docx6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docxBHANU281672
 
617httpsdrive.google.comdriveu0mobilefolders1e8xYisfDL.docx
617httpsdrive.google.comdriveu0mobilefolders1e8xYisfDL.docx617httpsdrive.google.comdriveu0mobilefolders1e8xYisfDL.docx
617httpsdrive.google.comdriveu0mobilefolders1e8xYisfDL.docxBHANU281672
 
6.2 What protocols comprise TLS6.3 What is the difference.docx
6.2 What protocols comprise TLS6.3 What is the difference.docx6.2 What protocols comprise TLS6.3 What is the difference.docx
6.2 What protocols comprise TLS6.3 What is the difference.docxBHANU281672
 
6.2 What protocols comprise TLS6.3 What is the difference bet.docx
6.2 What protocols comprise TLS6.3 What is the difference bet.docx6.2 What protocols comprise TLS6.3 What is the difference bet.docx
6.2 What protocols comprise TLS6.3 What is the difference bet.docxBHANU281672
 
6-3 Discussion Making DecisionsDiscussion Topic Starts Jun 5, 2.docx
6-3 Discussion Making DecisionsDiscussion Topic Starts Jun 5, 2.docx6-3 Discussion Making DecisionsDiscussion Topic Starts Jun 5, 2.docx
6-3 Discussion Making DecisionsDiscussion Topic Starts Jun 5, 2.docxBHANU281672
 
5An American in IndiaWhat is my inheritance To what am .docx
5An American in IndiaWhat is my inheritance To what am .docx5An American in IndiaWhat is my inheritance To what am .docx
5An American in IndiaWhat is my inheritance To what am .docxBHANU281672
 
6 PEER RESPONSES DUE IN 24 HOURS.. EACH SET OF 2 HAS ITS OWN INSTRUC.docx
6 PEER RESPONSES DUE IN 24 HOURS.. EACH SET OF 2 HAS ITS OWN INSTRUC.docx6 PEER RESPONSES DUE IN 24 HOURS.. EACH SET OF 2 HAS ITS OWN INSTRUC.docx
6 PEER RESPONSES DUE IN 24 HOURS.. EACH SET OF 2 HAS ITS OWN INSTRUC.docxBHANU281672
 
6 peer responses due in 18 hours Each set of 2 responses will ha.docx
6 peer responses due in 18 hours Each set of 2 responses will ha.docx6 peer responses due in 18 hours Each set of 2 responses will ha.docx
6 peer responses due in 18 hours Each set of 2 responses will ha.docxBHANU281672
 

More from BHANU281672 (20)

652020 Originality Reporthttpsblackboard.nec.eduweba.docx
652020 Originality Reporthttpsblackboard.nec.eduweba.docx652020 Originality Reporthttpsblackboard.nec.eduweba.docx
652020 Originality Reporthttpsblackboard.nec.eduweba.docx
 
64c51786.docx
64c51786.docx64c51786.docx
64c51786.docx
 
61Identify the case study you selected. Explain whether the.docx
61Identify the case study you selected. Explain whether the.docx61Identify the case study you selected. Explain whether the.docx
61Identify the case study you selected. Explain whether the.docx
 
60CHAPTER THREEconsistent with the so-called performative app.docx
60CHAPTER THREEconsistent with the so-called performative app.docx60CHAPTER THREEconsistent with the so-called performative app.docx
60CHAPTER THREEconsistent with the so-called performative app.docx
 
6 pagesThe following sections are in the final consulting .docx
6 pagesThe following sections are in the final consulting .docx6 pagesThe following sections are in the final consulting .docx
6 pagesThe following sections are in the final consulting .docx
 
600 words needed1. What do we mean by the New Public Administr.docx
600 words needed1. What do we mean by the New Public Administr.docx600 words needed1. What do we mean by the New Public Administr.docx
600 words needed1. What do we mean by the New Public Administr.docx
 
6 peer responses due in 24 hours Each set of 2 responses wil.docx
6 peer responses due in 24 hours Each set of 2 responses wil.docx6 peer responses due in 24 hours Each set of 2 responses wil.docx
6 peer responses due in 24 hours Each set of 2 responses wil.docx
 
6 page paper onWhat is second language acquisition and why is .docx
6 page paper onWhat is second language acquisition and why is .docx6 page paper onWhat is second language acquisition and why is .docx
6 page paper onWhat is second language acquisition and why is .docx
 
600 Words1) Specify some of the ways in which human resource m.docx
600 Words1) Specify some of the ways in which human resource m.docx600 Words1) Specify some of the ways in which human resource m.docx
600 Words1) Specify some of the ways in which human resource m.docx
 
612020 Originality Reporthttpsucumberlands.blackboard.docx
612020 Originality Reporthttpsucumberlands.blackboard.docx612020 Originality Reporthttpsucumberlands.blackboard.docx
612020 Originality Reporthttpsucumberlands.blackboard.docx
 
61520, 256 PMGlobal Innovation and Intellectual Property.docx
61520, 256 PMGlobal Innovation and Intellectual Property.docx61520, 256 PMGlobal Innovation and Intellectual Property.docx
61520, 256 PMGlobal Innovation and Intellectual Property.docx
 
6 Developing Strategic and Operational PlansIngram Publish.docx
6 Developing Strategic and Operational PlansIngram Publish.docx6 Developing Strategic and Operational PlansIngram Publish.docx
6 Developing Strategic and Operational PlansIngram Publish.docx
 
6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docx6212020 Originality Reporthttpsucumberlands.blackboar.docx
6212020 Originality Reporthttpsucumberlands.blackboar.docx
 
617httpsdrive.google.comdriveu0mobilefolders1e8xYisfDL.docx
617httpsdrive.google.comdriveu0mobilefolders1e8xYisfDL.docx617httpsdrive.google.comdriveu0mobilefolders1e8xYisfDL.docx
617httpsdrive.google.comdriveu0mobilefolders1e8xYisfDL.docx
 
6.2 What protocols comprise TLS6.3 What is the difference.docx
6.2 What protocols comprise TLS6.3 What is the difference.docx6.2 What protocols comprise TLS6.3 What is the difference.docx
6.2 What protocols comprise TLS6.3 What is the difference.docx
 
6.2 What protocols comprise TLS6.3 What is the difference bet.docx
6.2 What protocols comprise TLS6.3 What is the difference bet.docx6.2 What protocols comprise TLS6.3 What is the difference bet.docx
6.2 What protocols comprise TLS6.3 What is the difference bet.docx
 
6-3 Discussion Making DecisionsDiscussion Topic Starts Jun 5, 2.docx
6-3 Discussion Making DecisionsDiscussion Topic Starts Jun 5, 2.docx6-3 Discussion Making DecisionsDiscussion Topic Starts Jun 5, 2.docx
6-3 Discussion Making DecisionsDiscussion Topic Starts Jun 5, 2.docx
 
5An American in IndiaWhat is my inheritance To what am .docx
5An American in IndiaWhat is my inheritance To what am .docx5An American in IndiaWhat is my inheritance To what am .docx
5An American in IndiaWhat is my inheritance To what am .docx
 
6 PEER RESPONSES DUE IN 24 HOURS.. EACH SET OF 2 HAS ITS OWN INSTRUC.docx
6 PEER RESPONSES DUE IN 24 HOURS.. EACH SET OF 2 HAS ITS OWN INSTRUC.docx6 PEER RESPONSES DUE IN 24 HOURS.. EACH SET OF 2 HAS ITS OWN INSTRUC.docx
6 PEER RESPONSES DUE IN 24 HOURS.. EACH SET OF 2 HAS ITS OWN INSTRUC.docx
 
6 peer responses due in 18 hours Each set of 2 responses will ha.docx
6 peer responses due in 18 hours Each set of 2 responses will ha.docx6 peer responses due in 18 hours Each set of 2 responses will ha.docx
6 peer responses due in 18 hours Each set of 2 responses will ha.docx
 

Recently uploaded

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...Amil baba
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptNishitharanjan Rout
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptxJoelynRubio1
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17Celine George
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxPooja Bhuva
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfDr Vijay Vishwakarma
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsNbelano25
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxannathomasp01
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsSandeep D Chaudhary
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 

Recently uploaded (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
AIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.pptAIM of Education-Teachers Training-2024.ppt
AIM of Education-Teachers Training-2024.ppt
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 

it can be in 6 to 8 pages of project  it should be inclide1. Cover.docx

  • 1. it can be in 6 to 8 pages of project it should be inclide 1. Cover Page 2. Table of content 3. content 4. REFERECNCE 5. on content it should be include SCADA NETWORK TYPOGRAPHY & FLOW DIAGRAM along with sub headings it should be in above following ICS Architecture Final Project Template SEC6082 Your Name Table of Contents Executive Summary ............................................................................................... ......................... X ICS Industry Architecture Being Designed ................................................................................... X Overview
  • 2. ............................................................................................... ............................. X Statement of Need ............................................................................................... ............... X Detailed Description ............................................................................................... ............ X ICS Network Architecture ............................................................................................... .............. X Physical and Logical Designs ............................................................................................. X Protocols ............................................................................................... .............................. X Devices ............................................................................................... ................................ X ICS Security Architecture ............................................................................................... ............... X Device Security Configuration ........................................................................................... X Device Security Configuration ........................................................................................... X
  • 3. Device Security Configuration ........................................................................................... X Etc ............................................................................................... ........................................ X Appendix ............................................................................................... ......................................... X * Comprehensive Network Map .......................................................................................... X Example: Device Data Flows ............................................................................................. X Example: Security Design Documents ............................................................................... X Example: Intrusion Detection System ................................................................................ X Example: Honeypot Configuration ..................................................................................... X * The comprehensive network map must include all devices and communication protocols.
  • 4. List of Tables and Figures Figure 1. Example: Total Network Design ..................................................................................... X Figure 2. Example: Device Data Flow ............................................................................................ X Figure 3. Example: Intrusion Detection System ............................................................................. X Figure 4. Example: Honeypot Configuration ................................................................................. X Executive Summary An Executive Summary provides a brief overview for C-level Executives who only need to know what the material is about, not the details of the material. Give a brief summary, one page or less, of what this project is about. ICS Industry Architecture Being Designed This is arguably the most important part of the ICS architecture project.
  • 5. The logistical work done during this phase makes it possible to architect a successful ICS network. The origins of all problems experienced during the other phases can usually be tracked back to a lack of planning and understanding of your project during this phase. You will describe the industry you are architecting this ICS network for. 1. Overview Begin describing the types of network designs commonly used to architect this network. 2. Statement of Need Discuss the network needs of this architectural project. Your ICS network must include a SCADA network controlling at least two remote DCS networks. The SCADA network must securely share data with a traditional business IT network. 3. Detailed Description Now that you know the types of network commonly found and used in this industry and you know the particular needs of this architectural project, address how you will design this ICS network. ICS Network Architecture Provide a brief description of what will occur during this phase. For example: This is the phase where you will describe the physical and logical design of your network, etc.
  • 6. This phase has three sections: Physical and Logical Designs; Protocols; and Devices. 1. Physical and Logical Designs There are many physical and logical network designs possible. ICS networks usually have more than one physical and logical network solution. Describe your physical and logical ICS network designs here. Include Visios or Excel designs to graphically illustrate your designs. A block of words is provided below to jog your mind: Ring, star, bus, mesh, twisted pair, coax, fiber, microwave, satellite. 2. Protocols This section is where you will document and describe the protocols in use, where, and why. The protocols listed should be represented in your network diagram(s). A block of words is provided below to jog your mind: DNP3, Fieldbus, Modbus, Profibus, Ethernet. 3. Devices A list of devices should be provided with as much information as possible. Identify the open ports and services running on each. List them here and explain why you’ve chosen them. All devices listed should appear in your network diagram(s). Follow these steps below: a.
  • 7. Identify the device. b. Identify what the device does. c. Identify the open ports. d. Identify the services running on these ports. Example devices include, but are not limited to: Router, firewall, IDS/IPS, Honeypot, Historian, PLC, RTU, IED, data acquisition server, HMI, protocol gateway, SCADA master station, sensors. ICS Security Architecture List each device you previously documented in “3. Devices” but this time annotate how they will be secured. This will require you to research vendor documentation, industry best practices, and other authoritative sources. Identify known weaknesses of the devices and how you will mitigate them.
  • 9. ICS Architecture Final Project Template SEC6082 Your Name Table of Contents Executive Summary ............................................................................................... ......................... X ICS Industry Architecture Being Designed ................................................................................... X Overview ............................................................................................... ............................. X Statement of Need ............................................................................................... ............... X Detailed Description ............................................................................................... ............ X ICS Network Architecture ............................................................................................... .............. X Physical and Logical Designs ............................................................................................. X Protocols ............................................................................................... ..............................
  • 10. X Devices ............................................................................................... ................................ X ICS Security Architecture ............................................................................................... ............... X Device Security Configuration ........................................................................................... X Device Security Configuration ........................................................................................... X Device Security Configuration ........................................................................................... X Etc ............................................................................................... ........................................ X Appendix ............................................................................................... ......................................... X * Comprehensive Network Map .......................................................................................... X Example: Device Data Flows .................................................................................. ........... X Example: Security Design Documents ............................................................................... X
  • 11. Example: Intrusion Detection System ................................................................................ X Example: Honeypot Configuration ..................................................................................... X * The comprehensive network map must include all devices and communication protocols. List of Tables and Figures Figure 1. Example: Total Network Design ..................................................................................... X Figure 2. Example: Device Data Flow ............................................................................................ X Figure 3. Example: Intrusion Detection System ............................................................................. X Figure 4. Example: Honeypot Configuration ................................................................................. X
  • 12. Executive Summary An Executive Summary provides a brief overview for C-level Executives who only need to know what the material is about, not the details of the material. Give a brief summary, one page or less, of what this project is about. ICS Industry Architecture Being Designed This is arguably the most important part of the ICS architecture project. The logistical work done during this phase makes it possible to architect a successful ICS network. The origins of all problems experienced during the other phases can usually be tracked back to a lack of planning and understanding of your project during this phase. You will describe the industry you are architecting this ICS network for. 1. Overview Begin describing the types of network designs commonly used to architect this network. 2. Statement of Need Discuss the network needs of this architectural project. Your ICS network must include a SCADA network controlling at least two remote DCS networks. The SCADA network must securely share data with a traditional
  • 13. business IT network. 3. Detailed Description Now that you know the types of network commonly found and used in this industry and you know the particular needs of this architectural project, address how you will design this ICS network. ICS Network Architecture Provide a brief description of what will occur during this phase. For example: This is the phase where you will describe the physical and logical design of your network, etc. This phase has three sections: Physical and Logical Designs; Protocols; and Devices. 1. Physical and Logical Designs There are many physical and logical network designs possible. ICS networks usually have more than one physical and logical network solution. Describe your physical and logical ICS network designs here. Include Visios or Excel designs to graphically illustrate your designs. A block of words is provided below to jog your mind: Ring, star, bus, mesh, twisted pair, coax, fiber, microwave, satellite. 2. Protocols This section is where you will document and describe the protocols in use, where, and why. The protocols listed should be represented in your network
  • 14. diagram(s). A block of words is provided below to jog your mind: DNP3, Fieldbus, Modbus, Profibus, Ethernet. 3. Devices A list of devices should be provided with as much information as possible. Identify the open ports and services running on each. List them here and explain why you’ve chosen them. All devices listed should appear in your network diagram(s). Follow these steps below: a. Identify the device. b. Identify what the device does. c. Identify the open ports. d. Identify the services running on these ports. Example devices include, but are not limited to: Router, firewall, IDS/IPS, Honeypot, Historian, PLC, RTU, IED, data acquisition server, HMI, protocol gateway, SCADA master station, sensors. ICS Security Architecture List each device you previously documented in “3. Devices” but this time annotate how they will be secured. This will require you to research vendor documentation, industry best practices, and other authoritative sources.
  • 15. Identify known weaknesses of the devices and how you will mitigate them. Reference