Skip to main content
Workforce LibreTexts

8.4: Team Activity

  • Page ID
    4372
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)\(\newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    "Team" by Newtown grafitti via Flickr. CC BY 2.0.Overview

    Based on the risks that teams identified for their sector-based organization’s infrastructure in Module 7, student teams identify appropriate security controls to mitigate these risks.

     

     

    Team Activity Objectives

    • Describe how risk management techniques control risk.
    • List the types of security policies and how these relate to remediation.
    • Describe how awareness and training can provide increased security.
    • Identify remediation techniques in an ICS network including routers, firewall technology, and tools for configuring firewalls and routers.
    • Describe intrusion detection and prevention systems and web-filtering technologies.
    • Demonstrate the ability to evaluate and assess vulnerabilities in ICS networks.
    • Explain and make recommendations for remediation strategies in an ICS network.
    • Describe the hazards (do and don’ts) of the corporate network process vs. ICS network process.

     

    Using the CSET tool reports and identification of gaps in security from Module 7, develop a list of controls to be implemented to close the gaps and mitigate these risks.

     

    Assignment Options

    Option 1: Write a 2-page abstract summarizing the security controls your team would use to mitigate specific risks, based on the CSET gaps report.

    Option 2: Prepare 2–3 presentation slides describing the security controls your team would use to mitigate specific risks, based on the CSET gaps report.

     

    Grading Criteria Rubric

    • Content
    • Evidence of teamwork
    • References
    • Use of American Psychological Association (APA) style in writing the assignment

    Grade Points: 100

     


    8.4: Team Activity is shared under a CC BY license and was authored, remixed, and/or curated by LibreTexts.

    • Was this article helpful?