Cloud Applications

Please review the following for this week as well as All Week 8 Online Course Materials:•    NIST SP 800-82 Rev. 2, Guide to Industrial Control Systems (ICS) Security, May 2015.View the following video:https://www.youtube.com/watch?v=2jbFOCcvEJk&feature=youtu.be&t=4————————————————————Final ExamQuestion 1 (2 pages)1.      (a) In the NIST Cybersecurity Framework, the Framework Core provides a set of activities to achieve specific cybersecurity outcomes, and references examples of guidance to achieve those outcomes. It presents key cybersecurity outcomes identified by stakeholders as helpful in managing cybersecurity risk.  What are elements that comprise the Core? (Answer: Identify, Protect, Detect, Respond, and Recover)(b)  Provide a brief description of each of these elements.   (c) The cybersecurity Framework also incorporates Implementation Tiers that provide context on how an organization views cybersecurity risk and the processes in place to manage that risk.  Tiers describe an increasing degree of rigor and sophistication in cybersecurity risk management practices. They help determine the extent to which cybersecurity risk management is informed by business needs.  Please list the different Implementation Tiers.(d) In which Tier are the organization’s risk management practices formally approved, expressed as policy, and regularly updated based on the application of risk management processes to changes in business/mission requirements.Question 2 (2 pages)NIST SP 800-82, Guide to Industrial Control Systems (ICS) Security, provides guidance on how to secure Industrial Control Systems (ICS), including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC), while addressing their unique performance, reliability, and safety requirements. The document provides an overview of ICS and typical system topologies, identifies typical threats and vulnerabilities to these systems, and provides recommended security countermeasures to mitigate the associated risks.The document specifies sets of security controls, control enhancements, and supplemental guidance derived from the application of tailoring guidance to security control baselines described in NIST SP 800-53.  The baseline controls are the starting point for the security control selection process and chosen based on the security category and associate impact level of information systems.1.    According to NIST SP 800-82, what are the key factors that drive design decisions regarding the control, communication, reliability, and redundancy properties of the ICS?  List the factors and provide a short description of each in your own words.2.    Based on NIST SP 800-82, effectively integrating security into an ICS using cloud technology requires defining and executing a comprehensive program that addresses all aspects of security, ranging from identifying objectives to day-to-day operation and ongoing auditing for compliance and improvement.  What steps does NIST SP 800-82 describe as the basic process for developing a security program?————————————————————Week 8 Discussion: Security of Cloud Applications in Government and Industrial Automation (1 page)Write one page using APA format and providing one reference.From what you have gathered from this lesson, in your opinion, what are some of differences in the issues related to ICS cloud applications and “conventional” IT applications.————————————————————Week 8 Assignment: Security of Cloud Applications in Government and Industrial Automation (2 pages)Write one page (for each question) using APA format and providing two references. Precede each answer with the question and its corresponding number.1.    In a DoD cloud application, the Mission Owner inherits compliance from the CSP’s Cloud Service Offering (CSO) for the security controls (or portions thereof) that the CSP meets and maintains. Figure A-1 depicts, in general terms, the varying degrees of compliance shared by the Mission Owner and the CSP as a function of the type of service offerings.  Please discuss why the proportions are different for each type of service offering. Figure  A-1 (See attachment labeled Figure A-1)2.    Using wireless communication in industrial control systems poses possible risks and vulnerabilities. According to NIST SP 800-82, what are some of the guidelines that have to be observed in ICS wireless applications? 

Don't use plagiarized sources. Get Your Custom Essay on
Cloud Applications
From $8/Page
Order Essay
Calculate the price
Make an order in advance and get the best price
Pages (550 words)
$0.00
*Price with a welcome 20% discount applied.
Pro tip: If you want to save more money and pay the lowest price, you need to set a more extended deadline.
We know how difficult it is to be a student these days. That's why our prices are one of the most affordable on the market, and there are no hidden fees.

Instead, we offer bonuses, discounts, and free services to make your experience outstanding.
How it works
Receive a 100% original paper that will pass Turnitin from a top essay writing service
step 1
Upload your instructions
Fill out the order form and provide paper details. You can even attach screenshots or add additional instructions later. If something is not clear or missing, the writer will contact you for clarification.
Pro service tips
How to get the most out of your experience with Top Writers 4Me
One writer throughout the entire course
If you like the writer, you can hire them again. Just copy & paste their ID on the order form ("Preferred Writer's ID" field). This way, your vocabulary will be uniform, and the writer will be aware of your needs.
The same paper from different writers
You can order essay or any other work from two different writers to choose the best one or give another version to a friend. This can be done through the add-on "Same paper from another writer."
Copy of sources used by the writer
Our college essay writers work with ScienceDirect and other databases. They can send you articles or materials used in PDF or through screenshots. Just tick the "Copy of sources" field on the order form.
Testimonials
See why 10k+ students have chosen us as their sole writing assistance provider
Check out the latest reviews and opinions submitted by real customers worldwide and make an informed decision.
Communications
Thank you so much!
Customer 452461, June 23rd, 2021
Nursing
Excellent job! super recommended.
Customer 452487, August 24th, 2021
Nursing
Excellent. Thank you.
Customer 452487, August 26th, 2021
Microbiology
Thank you so much! I appreciate what you do and all of the great help you've given me!
Customer 452483, September 6th, 2021
Nursing
Excellent writing !! Definitely I will use your services again... Thank you.
Customer 452487, August 22nd, 2021
English 101
na
Customer 452547, March 22nd, 2022
Psychology
Thank you so much for all of your hard work, appreciate every bit of it!
Customer 452483, September 6th, 2021
Healthcare Writing & Communications
Perfect! Thank you so much for all of your help!
Customer 452483, October 31st, 2021
Nursing
Good job!! Thank you!!!
Customer 452487, September 9th, 2021
Communications
Well done! I thank you very much!
Customer 452483, July 9th, 2021
Healthcare Writing & Communications
Perfect! Thank you for also remembering to highlight the necessary words. Appreciate all of your help and hard work!
Customer 452483, November 7th, 2021
Healthcare Writing & Communications
Excellent!! You’re awesome, thank you very much for all of your hard work & help!!
Customer 452483, October 24th, 2021
1159
Customer reviews in total
96%
Current satisfaction rate
2 pages
Average paper length
47%
Customers referred by a friend
OUR GIFT TO YOU
20% OFF your first order
Use a coupon 24/7HELP and enjoy expert help with any task at the most affordable price.
Claim my 20% OFF Order in Chat
Open chat
Chat with us Live Here
Get in Touch with Our Live Chat Agents via WhatsApp on +1(346) 416-0954. Get Unlimited Access to Answers on Any Queries With Your Paper.