Final paper

Running Head: CYBER SECURITY 0

Improvement Plan Outline

Suresh Sevarthi

Lam Than

Wilmington University

03/19/2017












Improvement Plan Outline

  1. Introduction


  1. Definition of cybersecurity

  2. Objectives of cybersecurity implementation plan

  1. Maintain data integrity

  2. Protect confidentiality

  3. Ensure availability


  1. Current state description

  1. Identifying risks and vulnerabilities

  1. Hardware and software configuration

  1. Unsecured user accounts

  2. Misconfigured internet services

  3. Unsecured setting within the network equipment

  1. Network design

  2. Technological weaknesses

  1. TCP/IP protocol weaknesses

  2. OS weaknesses

  3. Network equipment weaknesses

  1. Internet security policy

  1. Develop a written policy

  2. Application of logical access controls

  3. Software and hardware installation policy

  4. Developing disaster recovery plan


  1. Overview of network weaknesses

  1. Wireless access points

  2. Internal unauthorized access

  3. USB flash drives

  1. Threats and vulnerabilities facing ICS

  1. Unstructured threat from inexperienced employees

  2. Structured threat from experienced hackers

  3. External threat

  1. Understanding of applicable regulations

1. CFATS compliance inspection

  1. Preparation for inspection

  1. Site map and current chemical inventory list

  2. Documents showing changes to the existing security measures

  3. Documents to explain the procedures involved in storage and transportation of chemicals.

  4. Documented progress of planned security measures

  5. The key human resource involved


  1. The inspection process

  1. Observations

  2. Interviews

  3. Review of documents referenced in the security plan

  4. Testing of the systems

F. Desired future state

  1. To have all stakeholders responsible for the ICS security

  2. A divided corporate and control network

  3. Use of the recommended risk analysis and risk reduction methodologies

  4. Safe and secure working internal and external environment

  1. Five areas of cyber-security to improve

  1. Develop a formal plan security

  2. Protect all computer networks and applications

  3. Protect the firm against internal and external threats

  4. Recruiting the required human resource to implement the cybersecurity system

  5. Investing cybersecurity training and education

H. Conclusion

  1. Emerging issues in network security

  2. Challenges facing cybersecurity

  3. Continuous network monitoring and assessment