Cloud Applications |Get Solution

Please review the following for this week as well as All Week 8 Online Course Materials:•    NIST SP 800-82 Rev. 2, Guide to Industrial Control Systems (ICS) Security, May 2015.View the following video:https://www.youtube.com/watch?v=2jbFOCcvEJk&feature=youtu.be&t=4————————————————————Final ExamQuestion 1 (2 pages)1.      (a) In the NIST Cybersecurity Framework, the Framework Core provides a set of activities to achieve specific cybersecurity outcomes, and references examples of guidance to achieve those outcomes. It presents key cybersecurity outcomes identified by stakeholders as helpful in managing cybersecurity risk.  What are elements that comprise the Core? (Answer: Identify, Protect, Detect, Respond, and Recover)(b)  Provide a brief description of each of these elements.   (c) The cybersecurity Framework also incorporates Implementation Tiers that provide context on how an organization views cybersecurity risk and the processes in place to manage that risk.  Tiers describe an increasing degree of rigor and sophistication in cybersecurity risk management practices. They help determine the extent to which cybersecurity risk management is informed by business needs.  Please list the different Implementation Tiers.(d) In which Tier are the organization’s risk management practices formally approved, expressed as policy, and regularly updated based on the application of risk management processes to changes in business/mission requirements.Question 2 (2 pages)NIST SP 800-82, Guide to Industrial Control Systems (ICS) Security, provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC), while addressing their unique performance, reliability, and safety requirements. The document provides an overview of ICS and typical system topologies, identifies typical threats and vulnerabilities to these systems, and provides recommended security countermeasures to mitigate the associated risks.The document specifies sets of security controls, control enhancements, and supplemental guidance derived from the application of tailoring guidance to security control baselines described in NIST SP 800-53.  The baseline controls are the starting point for the security control selection process and chosen based on the security category and associate impact level of information systems.1.    According to NIST SP 800-82, what are the key factors that drive design decisions regarding the control, communication, reliability, and redundancy properties of the ICS?  List the factors and provide a short description of each in your own words.2.    Based on NIST SP 800-82, effectively integrating security into an ICS using cloud technology requires defining and executing a comprehensive program that addresses all aspects of security, ranging from identifying objectives to day-to-day operation and ongoing auditing for compliance and improvement.  What steps does NIST SP 800-82 describe as the basic process for developing a security program?————————————————————Week 8 Discussion: Security of Cloud Applications in Government and Industrial Automation (1 page)Write one page using APA format and providing one reference.From what you have gathered from this lesson, in your opinion, what are some of differences in the issues related to ICS cloud applications and “conventional” IT applications.————————————————————Week 8 Assignment: Security of Cloud Applications in Government and Industrial Automation (2 pages)Write one page (for each question) using APA format and providing two references. Precede each answer with the question and its corresponding number.1.    In a DoD cloud application, the Mission Owner inherits compliance from the CSP’s Cloud Service Offering (CSO) for the security controls (or portions thereof) that the CSP meets and maintains. Figure A-1 depicts, in general terms, the varying degrees of compliance shared by the Mission Owner and the CSP as a function of the type of service offerings.  Please discuss why the proportions are different for each type of service offering. Figure  A-1 (See attachment labeled Figure A-1)2.    Using wireless communication in industrial control systems poses possible risks and vulnerabilities. According to NIST SP 800-82, what are some of the guidelines that have to be observed in ICS wireless applications? 

Don't use plagiarized sources. Get Your Custom Essay on
Cloud Applications |Get Solution
Get a 15% discount on this Paper
Order Essay
Quality Guaranteed

With us, you are either satisfied 100% or you get your money back-No monkey business

Check Prices
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 15% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know that being a student these days is hard. Because of this, our prices are some of the lowest on the market.

Instead, we offer perks, discounts, and free services to enhance your experience.
Sign up, place your order, and leave the rest to our professional paper writers in less than 2 minutes.
step 1
Upload assignment instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
s
Get personalized services with My Paper Support
One writer for all your papers
You can select one writer for all your papers. This option enhances the consistency in the quality of your assignments. Select your preferred writer from the list of writers who have handledf your previous assignments
Same paper from different writers
Are you ordering the same assignment for a friend? You can get the same paper from different writers. The goal is to produce 100% unique and original papers
Copy of sources used
Our homework writers will provide you with copies of sources used on your request. Just add the option when plaing your order
What our partners say about us
We appreciate every review and are always looking for ways to grow. See what other students think about our do my paper service.
Nursing
Thank you to the writer and also thank you to the support team I got an A for the paper
Customer 452635, June 17th, 2022
Social Work and Human Services
Great Work!
Customer 452587, November 2nd, 2021
Social Work and Human Services
Great Work!
Customer 452587, September 8th, 2021
Nursing
Thank you for a great paper.
Customer 452707, August 6th, 2022
Human Resources Management (HRM)
Thank you
Customer 452531, May 19th, 2021
Other
awesome
Customer 452813, July 2nd, 2024
Social Work and Human Services
Excellent Work!
Customer 452587, July 28th, 2021
Nursing
Great paper!
Customer 452707, January 14th, 2024
Social Work and Human Services
Great Job!
Customer 452587, October 27th, 2021
Social Work and Human Services
Excellent!
Customer 452587, August 3rd, 2021
Social Work and Human Services
Excellent Work!
Customer 452587, November 30th, 2021
Social Work and Human Services
Awesome, Work! Didn't have to add much to it. Thank You!
Customer 452587, September 7th, 2021
Enjoy affordable prices and lifetime discounts
Use a coupon FIRST15 and enjoy expert help with any task at the most affordable price.
Order Now Order in Chat

Ensure originality, uphold integrity, and achieve excellence. Get FREE Turnitin AI Reports with every order.