Answered You can buy a ready-made answer or pick a professional tutor to order an original one.

QUESTION

This week we will be continuing our journey to develop and communicate a cyber-security improvement plan in our case study

This week we will be continuing our journey to develop and communicate a cyber-security improvement plan in our case study assignment for PureLand Waste Water.  During Week 2, we’ll be developing and submitting an outline for the improvement plan that will demonstrate understanding of the assignment along with all the required elements of a quality plan.

1.  First, read the document titled, "Outline for Cyber-Security Improvement Plan" available in Blackboard in the PureLand Case Study area. This document will explain all the necessary parts included in your plan.

2.  Using the detailed instructions attached in the file, "Outline for cyber security improvement plan.doc", create your own outline that has the following components:

  • Introduction
  • Current state description
  • Overview of network weaknesses
  • Threats and vulnerabilities facing the ICS
  • Understanding of applicable regulations
  • Desired future state
  • Five areas of cyber-security you want to improve
  • Conclusion

Submit to Blackboard your outline for the final paper (in Microsoft Word format) which is a cyber-security improvement plan for PureLand Wastewater.

Important: This is an outline only, not a paper. It should only include headings, not paragraphs and content under each heading.

Show more
  • @
  • 165 orders completed
ANSWER

Tutor has posted answer for $20.00. See answer's preview

$20.00

********************* ******** CASENameInstitution               IntroductionCybercrimes *** cyber ********* are ********** *** ********* as **** ********** Any ************ that operates ** *** ******* and ***** *** *** of network *** internet ** ***** ***** ** **** a well-established ******** ******* *** only for *** ******** crimes but **** *** the *********** **** ***** ** ***** ** ******* an ******** ** activities that **** ** ******** ******* ******* *** possible ******** ************* ********* *** *********** *** ******** **** the future ************** state ******************* ******* like any ***** ******* ** facing a ******* ***** **** ** comes ** issue cyber security ****** that *** organization ***** **** *** **** *********** ** *** ****** ** ***** ******** *** *********** ****** must **** **** compromised by ****** ** internal attacker ** *** be ** ******** ****** ****** that the *********** has **** leaked *** ** ** ********** ******* a tough ***** ****** ** ***** ****** ** ** **** ******** ** the *** The ******* state ** *** ************ ** **** ** *** no ***** ******** ******** ***** * ***** ** 2013)Overview of ******* ************* **** weakness that can ** ******** **** the case scenario **** *** ***** business the PureLand ******* **** ******** ******** ******* which ** **** ** everyone *** openness of *** ** internet ***** **** ********** ** *** ***** ******** *** **** other ********* intruders *** information **** *** ** network *** ** accessed by ****** within *** ******* *** **** ** *** **** ** ***** hands *** **** ********* **** **** ****** the *********** *** ******* the ** ******* ************* ***** a ******** ***** ** it ** the **** ** *** PureLand ************** *** *************** facing *** ******* of *** ******* *** vulnerability **** *** *** ** ****** ********* *** **** ** ******** uses * very smart code to attack *** ********** control ****** of *** company ***** errors ********* may *********** ****** *** **************** ********* *********** ** *** attacker ******** ******** **** ********* *** reveal *** *********** *********** *** ***** ******** gain *** *** **** ****** *** ************* ** *** ******** ******* *** *** may face ******** attacks due ** the ********** ** politicians *** **** competitorsUnderstanding ** ********** regulationsIt is critical for ******** within ** ************ ** ********** all *********** *** ** *** ************ ****** ** ****** *** ******** ** the ************ *** ** ** ******** ** ***** ******** * ******** ************* the *********** that has **** ********** ** the organization **** **** the organization * *** ** ********* ** *** aspect of ******** that *** ******* ** secureDesired ****** ******** **** ****** **** *** ******* ****** **** is *** *** that *** *** ******** security measure *** ******** ** *** employees on how ** ****** *** ************* ******** All ********* ****** understand *** ******** and **** ******* ********* *** organizations’ security goalFive ***** ** ************** you **** ** ********** *** organization to attain * higher ***** ******** ********* ***** are * ****** ** areas **** *** ************ needs to improve ******* *********** ******* the company’s ********* in ***** to **** ******** ******* ********** Security ******* ****** *** security *********** ****** ***** *** concept ** reverse *********** ***** **** ****** **** they ***** *** **** ***** of *** attack ********* should ** ******** *** *** ******* ** developing a ****** ********* be illustrated ** **** ******* ** *** ****** of ************* *** ****** ** ******** should ** ************ ************************ ******** ** an ******* ************** ** ***** ******** ****** *** ************ ** ****** ** ********** that for ** organization ** be strong security **** *** ********** ********* *** network security *********** ****** work **** in hand *** **** ensuring ********* is ********* or ****** eliminated           ReferenceWang * ***** Lu * (2013) ***** security ** *** Smart Grid: ****** *** challenges ******** ******** 57(5) *************

Click here to download attached files: CYBER SECURITY CASE.docx
or Buy custom answer
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question