Skip to main content
Workforce LibreTexts

3.3: Hands-on Activity

  • Page ID
    4346
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)

    "hands" by geralt via Pixabay. CC0Overview

    Explore the interactive graphic Secure Architecture Design. This secure design is the result of an evolutionary process of technology advancement and increasing cyber vulnerability presented in the Recommended Practice document Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.

     

    Hands-on Activity Objectives

    • List several types of networking hardware and explain the purpose of each.
    • List and describe the functions of common communications protocols and network standards used within CI.
    • Explain how existing network administration principles can be applied to secure CIKR.
    • Identify new types of network applications and how they can be secured.

     

    Assignment

    Use the ICS-Cert learning portal to examine an enterprise diagram for an overview of a network. If you are not registered yet, please register.

    Hover over the various areas of the Secure Architecture Design graphic, located at https://ics-cert.us-cert.gov/Secure-Architecture-Design. Click inside the box for additional information associated with the system elements.

    After downloading and reading Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense-In-Depth Strategies (see Required Reading), navigate through the embedded description in the Secure Architectural Design diagram.

    Write a short paper describing the following recommended practices for improving industrial control systems cybersecurity with Defense-In-Depth Strategies for your team’s fictitious sector-based company:

    • Security Challenges within Industrial Control Systems
    • Isolating and Protecting Assets: Defense-in-Depth Strategies
    • Recommendations and Countermeasures

     

    Grading Criteria Rubric

    • Content
    • Evidence of teamwork
    • References
    • Use of American Psychological Association (APA) style in writing the assignment

    Grade points: 100


    3.3: Hands-on Activity is shared under a CC BY license and was authored, remixed, and/or curated by LibreTexts.

    • Was this article helpful?