Question: Defense in depth is a layered strategy for securing ICS systems. In fact, this approach has been used in the labs with the DMZ ,

Defense in depth is a layered strategy for securing ICS systems. In fact, this approach has been used in the labs with the DMZ, firewalls, and penetration testing, for example. In your reading over the last several weeks, we have explored 1) risk management, 2) the ICS architecture, including the network architecture, perimeter and host security 3) ICS security management (standards, policy and procedures), and 4) physical security. Peripherally, 5) security monitoring, 6) vendor management, and the 7) human factor have been within the context. Pick two of the numbered areas and explain each of their roles in building a defense at depth strategy. What role does monitoring and implementing incident response plans play in the strategy for the areas you chose? Also, how does one of the following vulnerability management, configuration management, log management and change control impact the strategy for your two areas?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!