Imagine you are a political writer with your own blog. You write about current events and what they mean for the U.S. government and its citizens. For this blog post, you will choose an event from the last 3 months involving U.S. political issues or policies related to one of the following:
the U.S. President
congress
administrative departments
political activists
judicial rulings
a campaign
an election
Next, choose 1 reputable news source that has reported on your chosen event. Be sure it is a news source that offers well-written and well-researched news. It is recommended that you choose from one of the following news sources:
liberal leaning news: The New York Times, The Washington Post, The Atlantic, Vox, HuffPost, Politico, CNN, Time Magazine
conservative leaning news: National Review, The Washington Times, The Wall Street Journal, The Federalist, Fox Online News, Washington Examiner
centrist News: NPR Online News (National Public Radio), Reuters, BBC, CNBC News, USA Today, Christian Science Monitor, Pew Research Center
To see ratings of news sources, visit AllSides’s Media Bias Ratings.
For the first part of your blog post, provide a brief summary of your chosen current event. You should be conscious of your own bias and make every effort to avoid biased, opinionated, emotional, or judgmental language in this summary. That means avoiding words such as “always,” “obviously,” “clearly,” etc.
In addition to providing a brief summary of your chosen current event, your blog post should answer each of the following questions:
What specific branch of the U.S. government is involved in this current event?
Who or which groups are affected by this event?
What biases or leanings exist in the media source you chose? Give examples. Were these counterbalanced in any way?
What are your opinions on the issue?
Your blog post should be typed in a Word document and meet the following requirements:
A 1-2 paragraph summary of your chosen current event. Include what the event is, when it took place, and the political issues or policies to which it connects.
Write 1-2 paragraphs for each of the four questions provided (see above), for a total of at least four paragraphs.
Base your blog content on information from your selected news source or other reputable sources.
Ensure your paper is 2-3 pages in total length.
Cite your selected news article any any other sources using the Strayer Writing Standards format.
[supanova_question]
Running Head: ICS Risk & Audit Methodology Project Template 1 ICS RISK
Writing Assignment Help Running Head: ICS Risk & Audit Methodology Project Template 1
ICS RISK & AUDIT METHODOLOGY PROJECT TEMPLATE 2
ICS Risk & Audit Methodology Project Template
SEC6084
Your Name
Table of Contents
Description of Industry X
Industrial Control System Processes Employed X
Profile ICS Security Devices X
Create Diagrams of ICS Device Network X
Identify Security Controls X
Apply ICS Security Best Practices X
Identify Vulnerability Continuous Monitoring Strategy X
Reference X
Appendix X
Example: Test Outputs X
Example: Vulnerability Scan Reports X
Example: Analysis Metrics from Tools X
Example: Presentations X
Example: Screenshots of Systems X
List of Tables and Figures
Figure 1. Example: ICS System Documentation X
Figure 2. Example: Security Solution Documentation X
Description of Industry
1. What type of industry is this?
2. What is the importance of this industry to society?
Industrial Control System Processes Employed
1. List industrial control system processes specific to industry.
2. List the control systems that control those processes and how they control those processes.
3. Create a network diagram displaying the interconnections of the industrial control system devices listed in item 3.
a. For example: Use ICS CERT CSET, Visio, Excel, Word, etc.
Profile ICS Devices
1. For each ICS device document:
a. Logical Ports
For example, 80, 443, etc.
http://www.digitalbond.com/tools/the-rack/control-system-port-list/
b. Protocols Running
For example, SMTP, SNMP, DNP3, Modbus, Fieldbus, Ethernet, etc.
c. Physical Connection Types
For example, serial, RJ45, USB, parallel, etc.
http://www.digitalbond.com/tools/the-rack/control-system-port-list/
d. Default Accounts:
Research the manufacturer’s information on the device. Look for default account information to login with.
Check “Default Password List” for an entry: http://www.defaultpassword.com/
e. Services
Research manufacturer’s information on the device and document services running.
f. Authentication
Research manufacturer’s website for the device and locate information on how the device authenticates users.
g. Use of Encryption
Research manufacturer’s website for the device and locate information about encryption. For example, does the device use encrypted connections? Is the back-end database encrypted? What type of encryption does it use? Is public/private key encryption like RSA?
h. Logging Capability
Research manufacturer’s website for the device and locate information about logging. Answer questions like is logging enabled? Are logs stored locally or remotely?
i. Other Security Documentation
Does the manufacturer have any security related documentation not provided above that would be of use?
Identify Security Controls
1. Select security controls based on results from “Industrial Control System Processes Employed” and “Profile ICS Devices”:
Reference either ICS CERT CSET or NIST 800-53, Security and Privacy Controls for Federal Information Systems and Organizations,
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf
Apply ICS Security Best Practices
1. NIST 800-82, Industrial Control System Security, http://csrc.nist.gov/publications/drafts/800-82r2/sp800_82_r2_draft.pdf
2. Identify unremediated risks and choose risk strategy: Accept risk, avoid risk, mitigate risk, share risk, transfer risk, combination.
Reference: NIST 800-37, Guide for Applying the Risk Management Framework to Federal Information Systems, http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-37r1.pdf
Identify Vulnerability Continuous Monitoring Strategy
1. Examples:
a. Nessus – Bandolier modules.
b. Metasploit – ICS exploits.
c. Snort
d. Nmap – Identify ICS “friendly” scans.
2. Are these IA certified tools? How so?
a. For example:
i. NIAP: https://www.niap-ccevs.org/CCEVS_Products/pcl.cfm
ii. Common Criteria: https://www.commoncriteriaportal.org/products/
b. For example: Are these tools SCAP-compliant?
3. Create script rules for baselining each ICS system.
a. For example scripts rules should audit:
i. Installed programs.
ii. Users, groups.
iii. Shares.
iv. Services.
v. Processes.
vi. Etc.
Reference
Appendix[supanova_question]