Final paper

Running Head: NETWORK SECURITY IMPROVEMENTS 1





Network security improvements

Suresh Sevarthi

Lam Than

Wilmington University

03/31/2017










One of the secure enclaves that the PureLand Water Waste adopted to improve cyber security is the defense-in –depth strategy. This strategy puts into account that a combination of security technologies, controls and policies must be done so as to protect an industry control system.

Enclave Characteristic

Description

Comments

Functional group

They include the supervisory control, control loop and user group

They have to active

Criticality of devices

Devices that ensure the data is protected and there is flow of communication

Devices that are well working are recommended.

Data flow in/out

Steady flow

Reaches where it is required.

Perimeter Security Devices recommended

Intrusion prevention system, data diode and industrial protocol filters

They protect accessing these enclaves without authority

Data monitored within enclave

The information of the hardware like the physical location of the manufacture, the network address of the equipment and the hardware device detail.

Should be secured and encrypted.

Methods used to monitor enclave

The use of host base security that controls the end-user authentication

Helps improve the created enclave





The other secure enclave for the PureLand Water Waste is the limit access. In the limit access strategy, monitoring of who is accessing certain information and for what purpose is done.

Limited access

Enclave Characteristic

Description

Comments

Functional group

Control loops and user groups

They should be active functional groups

Criticality of devices

Role based- access control

Outsiders cannot access information

Data flow in/out

Steady but to authorized users only

Should be encrypted

Perimeter Security Devices recommended

Cctv, access control

They will prevent unnecessary access of data.

Data monitored within enclave

The water waste data

Should only be accessed by authorized operators

Methods used to monitor enclave

A control strategy ran by an operator

This strategy can start and even stop a pump but cannot be able to change it.

The other secure enclave for this company is the physical control. This is the physical attempt to prevent information which includes; looking the computers in a cabinet and even blocking the USB ports, mapping, putting the Ethernet switch control.

Description

Comments

Functional group

Owner, operator, equipments and buildings

Must be active

Criticality of devices

Should be role- based controlled

Authorized users only access the information.

Data flow in/out

regulated

Should be regulated

Perimeter Security Devices recommended

Sensors, building systems, alarms, Cctv and lighting control system,

Should be operational and very effective.

Data monitored within enclave

The information of the software as well as for the hardware devices.

Should be the recommended data.

Methods used to monitor enclave

Blocking off the USB ports so that information cannot be transferred from one device to another.

Very helpful.