SlideShare ist ein Scribd-Unternehmen logo
1 von 13
CAE-2Y Accredited
Topics Covered
• E-Book Purpose
• Key Objectives
• Outline Of Content
• Training Plans
– Cybersecurity Programs
– Boot Camp
• About ENMU-Ruidoso
• Q & A?
2
CAE-2Y Accredited
Purpose
• Provide a quick reference guide to the
framework
• Promote awareness of
– Cybersecurity Critical Infrastructure Framework
– SCADA Cybersecurity threats and vulnerabilities
– The importance of risk assessments
– How to use the framework
– Look into applying security to Indusoft Web Studio
3
CAE-2Y Accredited
Key Objectives
• Knowledge of SCADA and cybersecurity
environment
– Types of SCADA systems
– Threats and risks
• Understanding of framework
• Knowledge of tools and processes for risk
analysis
• Ability to apply risk management processes to
obtain the right framework tier for an
organization. 4
CAE-2Y Accredited
Outline Of Content
• Chapter 1 - SCADA Cybersecurity Introduction
and Review
– What is SCADA
– Overview of Cybersecurity Vulnerabilities
– Understanding Control System Cyber Vulnerabilities
• Chapter 2 – Cybersecurity Framework
Introduction
– Framework Introduction
– Risk Management and
– the Cybersecurity Framework
5
CAE-2Y Accredited
Outline Of Content
• Chapter 3 – Cybersecurity Framework Basics
– Basic framework overview
– Framework core
• Chapter 4 – How to Use the Framework
– Basic Review of Cybersecurity Practices
– Establishing or Improving a Cybersecurity Program
– Communicating Cybersecurity Requirements with
Stakeholders
• Chapter 5 – Indusoft Security Guide
– Embedded in this chapter.
6
CAE-2Y Accredited
Outline Of Content
• Appendix (Framework Core, CSET Tool, References, and
Glossary)
7
CAE-2Y Accredited
CSET 6.1 Tool
8
https://ics-cert.us-cert.gov/Assessments
CAE-2Y Accredited
Training Plans:
Cybersecurity Programs
• Computer and Network Security Certification Program (Online)
Credited or Self-paced
• This program is specifically designed to prepare students as
Information Systems Security (INFOSEC) Professionals, NSTISSI No.
4011and CNSSI No. 4016 Entry Level Risk Analysts and is CAE-2Y
Accredited.
– IS 131: Network Security Fundamentals-3
– IS 136: Guide to Disaster Recovery- 3
– IS 153/L: Introduction to Information System- 4
– IS 253: Firewalls and How They Work- 3
– IS 257: Network Defense and Counter Measures- 3
– IS 258: Cyber Ethics, Professionalism, and Career Development- 3
9
CAE-2Y Accredited
Training Plans:
Cybersecurity Programs
• Associates of Applied Science Degree - Information Systems
Cybersecurity (Online) Credited (CAE-2Y,4011 & 4016-E, DOD
8570) Career pathway to 4-yr degrees
• The focus of this program will be on the key components of
information systems assurance and cybersecurity:
– People
– Software
– Hardware
– Data
– Security
– Communication technologies
– How these components can be integrated and managed to create
competitive advantage.
10
CAE-2Y Accredited
Training Plans:
Boot Camp
• 4 day Boot Camp covering:
– Course Orientation and Introduction to Cybersecurity and SCADA
• CompTIA-Security+ Key Topics
• SCADA Cybersecurity Recommended Practice/ Infrastructure
Guiding Principles/National Infrastructure Protection Plan
– IS-821 Critical Infrastructure and Key Resources Support Annex
– IS-860.a National Infrastructure Protection Plan (NIPP)
• Cybersecurity Critical Infrastructure Framework / CAP
Process/Intro to a SCADA Product (IDUSOFT)
• CSET Department of Homeland Security Risk Assessment Process
and Tools Using the Cybersecurity Critical Infrastructure Framework
11
CAE-2Y Accredited
About ENMU-Ruidoso
 The National Security Agency and the Department of Homeland
Security have designated Eastern New Mexico University - Ruidoso
 National Center of Academic Excellence in Information
Assurance/Cybersecurity Defense through academic year 2019.
 Based on the universities ability to meet the increasing demands
of the program criteria will serve the nation well in contributing to
the protection of the National Information Infrastructure.
 Meets the eleven Knowledge Units learning objectives
 Recognized by the National Initiative in Cybersecurity Education
(NICE) as a certified Training Institution for the NIST National
Cybersecurity Workforce Framework.
 http://csrc.nist.gov/nice/index.htm
12
CAE-2Y Accredited
http://www.us-cert.gov/control_systems/csstandards.html
CAE-2Y Accredited

Weitere ähnliche Inhalte

Was ist angesagt?

Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14
James Nesbitt
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
 

Was ist angesagt? (20)

Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- Insurance
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
 
Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14Industrial Control Security USA Sacramento California Oct 13/14
Industrial Control Security USA Sacramento California Oct 13/14
 
NIST releases SP 800-160 Multi-discplinary approach to cybersecurity
NIST releases SP 800-160  Multi-discplinary approach to cybersecurityNIST releases SP 800-160  Multi-discplinary approach to cybersecurity
NIST releases SP 800-160 Multi-discplinary approach to cybersecurity
 
Ics & computer security for nuclear facilities
Ics & computer security for nuclear facilitiesIcs & computer security for nuclear facilities
Ics & computer security for nuclear facilities
 
Residency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resiResidency research makeup project acme enterprise scenario resi
Residency research makeup project acme enterprise scenario resi
 
Security architecture principles isys 0575general att
Security architecture principles isys 0575general attSecurity architecture principles isys 0575general att
Security architecture principles isys 0575general att
 
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin WheelerNTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
NTXISSACSC2 - Securing Industrial Control Systems by Kevin Wheeler
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentation
 
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...Challenges and Solution to Mitigate the cyber-attack  on Critical Infrastruct...
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
 
The NIST Cybersecurity Framework
The NIST Cybersecurity FrameworkThe NIST Cybersecurity Framework
The NIST Cybersecurity Framework
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
What is micro segmentation?
What is micro segmentation?What is micro segmentation?
What is micro segmentation?
 
Isaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industryIsaca career paths - the highest paying certifications in the industry
Isaca career paths - the highest paying certifications in the industry
 
Cyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply ChainCyber Security Professionals Viewed via Supply Chain
Cyber Security Professionals Viewed via Supply Chain
 
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
Dubai Cyber Security   02   Ics Scada Cyber Security Standards, Solution Tips...Dubai Cyber Security   02   Ics Scada Cyber Security Standards, Solution Tips...
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
 
Cybersecurity Framework - Introduction
Cybersecurity Framework - IntroductionCybersecurity Framework - Introduction
Cybersecurity Framework - Introduction
 
Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo Tripwire Energy Working Group: TIV Demo
Tripwire Energy Working Group: TIV Demo
 

Andere mochten auch

Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetCybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Juniper Networks
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
Kyle Lai
 
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
tmuehleisen
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
docomusa
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Positive Hack Days
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
wardjo
 

Andere mochten auch (20)

Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 
Cyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework PanelCyber Critical Infrastructure Framework Panel
Cyber Critical Infrastructure Framework Panel
 
01. Critical Information Infrastructure Protection
01. Critical Information Infrastructure Protection01. Critical Information Infrastructure Protection
01. Critical Information Infrastructure Protection
 
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall StreetCybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
Cybersecurity: Critical Infrastructure Threats from Main Street to Wall Street
 
Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016Cyber Security 4.0 conference 30 November 2016
Cyber Security 4.0 conference 30 November 2016
 
TPDDL's Learning & Development At Cenpeid
TPDDL's Learning & Development At CenpeidTPDDL's Learning & Development At Cenpeid
TPDDL's Learning & Development At Cenpeid
 
Hacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00bHacking Critical Infrastructure Like You’re Not a N00b
Hacking Critical Infrastructure Like You’re Not a N00b
 
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
ISACA - China Cybersecurity Law Presentation - Kyle Lai - v3.2
 
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
Cybersecurity Guide for the State of Washington Critical Infrastructure_9_2015
 
DocomUSA Cyber Security
DocomUSA Cyber SecurityDocomUSA Cyber Security
DocomUSA Cyber Security
 
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...VIVA LA COMPLEJIDAD !  BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
VIVA LA COMPLEJIDAD ! BIG DATA Y TECNOLOGÍA : ELEFANTES EN CIUDADES DE PORCE...
 
Presentation
Presentation Presentation
Presentation
 
Critical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation SectorCritical Infrastructure and Cybersecurity Transportation Sector
Critical Infrastructure and Cybersecurity Transportation Sector
 
City Infrastructure Cybersecurity
City Infrastructure CybersecurityCity Infrastructure Cybersecurity
City Infrastructure Cybersecurity
 
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
Recent Cybersecurity Concerns and How to Protect SCADA/HMI Applications Prese...
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
 
Symantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection StudySymantec 2010 Critical Infrastructure Protection Study
Symantec 2010 Critical Infrastructure Protection Study
 
Critical infrastructure
Critical infrastructureCritical infrastructure
Critical infrastructure
 
Bio Daniel Donatelli
Bio Daniel DonatelliBio Daniel Donatelli
Bio Daniel Donatelli
 
Network security and policies
Network security and policiesNetwork security and policies
Network security and policies
 

Ähnlich wie Cybersecurity Critical Infrastructure Framework Course Textbook and the class/curriculum for Security Certification

Critical Infrastructure Protection (CIP) NERC Training : Tonex Training
Critical Infrastructure Protection (CIP) NERC Training : Tonex TrainingCritical Infrastructure Protection (CIP) NERC Training : Tonex Training
Critical Infrastructure Protection (CIP) NERC Training : Tonex Training
Bryan Len
 
Essentials of Project Management
Essentials of Project ManagementEssentials of Project Management
Essentials of Project Management
Living Online
 
Cybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA SystemsCybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA Systems
Living Online
 
Professional organizations of interest to information security professionals
Professional organizations of interest to information security professionalsProfessional organizations of interest to information security professionals
Professional organizations of interest to information security professionals
Shivani Gamit
 

Ähnlich wie Cybersecurity Critical Infrastructure Framework Course Textbook and the class/curriculum for Security Certification (20)

Ccsk course content v1
Ccsk course content v1Ccsk course content v1
Ccsk course content v1
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
 
Csa summit who can protect us education for cloud security professionals
Csa summit   who can protect us education for cloud security professionalsCsa summit   who can protect us education for cloud security professionals
Csa summit who can protect us education for cloud security professionals
 
Integrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsIntegrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of Standards
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
 
Security+ Course Overview (2008)
Security+ Course Overview (2008)Security+ Course Overview (2008)
Security+ Course Overview (2008)
 
Critical Infrastructure Protection (CIP) NERC Training : Tonex Training
Critical Infrastructure Protection (CIP) NERC Training : Tonex TrainingCritical Infrastructure Protection (CIP) NERC Training : Tonex Training
Critical Infrastructure Protection (CIP) NERC Training : Tonex Training
 
Network Security LabNetwork Security Lab
Network Security LabNetwork Security LabNetwork Security LabNetwork Security Lab
Network Security LabNetwork Security Lab
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
 
Essentials of Project Management
Essentials of Project ManagementEssentials of Project Management
Essentials of Project Management
 
The Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - RothkeThe Cloud is in the details webinar - Rothke
The Cloud is in the details webinar - Rothke
 
Nist cybersecurity framework isc2 quantico
Nist cybersecurity framework  isc2 quanticoNist cybersecurity framework  isc2 quantico
Nist cybersecurity framework isc2 quantico
 
FDP MP IITJ TISC.pdf
FDP MP IITJ TISC.pdfFDP MP IITJ TISC.pdf
FDP MP IITJ TISC.pdf
 
CA Self Regulation
CA Self RegulationCA Self Regulation
CA Self Regulation
 
Cybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA SystemsCybersecurity for Automation Control and SCADA Systems
Cybersecurity for Automation Control and SCADA Systems
 
Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
01Introduction to Information Security.ppt
01Introduction to Information Security.ppt01Introduction to Information Security.ppt
01Introduction to Information Security.ppt
 
Sosialisasi sni iso iec 15408 common criteria - evaluasi keamanan ti
Sosialisasi sni iso iec 15408 common criteria - evaluasi keamanan tiSosialisasi sni iso iec 15408 common criteria - evaluasi keamanan ti
Sosialisasi sni iso iec 15408 common criteria - evaluasi keamanan ti
 
Professional organizations of interest to information security professionals
Professional organizations of interest to information security professionalsProfessional organizations of interest to information security professionals
Professional organizations of interest to information security professionals
 
Datasheet
DatasheetDatasheet
Datasheet
 

Mehr von AVEVA

Mehr von AVEVA (20)

What's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
What's New In InduSoft Web Studio 8.1 + SP5 from AVEVAWhat's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
What's New In InduSoft Web Studio 8.1 + SP5 from AVEVA
 
What's New In InduSoft Web Studio 8.1 + SP4
What's New In InduSoft Web Studio 8.1 + SP4What's New In InduSoft Web Studio 8.1 + SP4
What's New In InduSoft Web Studio 8.1 + SP4
 
Introduction to InduSoft Web Studio 8.1 + SP5
Introduction to InduSoft Web Studio 8.1 + SP5Introduction to InduSoft Web Studio 8.1 + SP5
Introduction to InduSoft Web Studio 8.1 + SP5
 
What's New In InduSoft Web Studio 8.1 + SP3
What's New In InduSoft Web Studio 8.1 + SP3What's New In InduSoft Web Studio 8.1 + SP3
What's New In InduSoft Web Studio 8.1 + SP3
 
Introduction to InduSoft Web Studio 8.1 + SP3
Introduction to InduSoft Web Studio 8.1 + SP3Introduction to InduSoft Web Studio 8.1 + SP3
Introduction to InduSoft Web Studio 8.1 + SP3
 
Introduction to InduSoft Web Studio 8.1 + SP2
Introduction to InduSoft Web Studio 8.1 + SP2Introduction to InduSoft Web Studio 8.1 + SP2
Introduction to InduSoft Web Studio 8.1 + SP2
 
What's New In InduSoft Web Studio 8.1 + SP2
What's New In InduSoft Web Studio 8.1 + SP2What's New In InduSoft Web Studio 8.1 + SP2
What's New In InduSoft Web Studio 8.1 + SP2
 
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - Indu...
 
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
Alarm Notifications with WIN-911 NOW Available for InduSoft Web Studio - WIN-...
 
Introduction to InduSoft Web Studio 8.1 + Service Pack 1
Introduction to InduSoft Web Studio 8.1 + Service Pack 1Introduction to InduSoft Web Studio 8.1 + Service Pack 1
Introduction to InduSoft Web Studio 8.1 + Service Pack 1
 
What's New In InduSoft Web Studio 8.1 + SP1
What's New In InduSoft Web Studio 8.1 + SP1What's New In InduSoft Web Studio 8.1 + SP1
What's New In InduSoft Web Studio 8.1 + SP1
 
Introduction to InduSoft Web Studio 8.1 + SP1
Introduction to InduSoft Web Studio 8.1 + SP1Introduction to InduSoft Web Studio 8.1 + SP1
Introduction to InduSoft Web Studio 8.1 + SP1
 
Security and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web StudioSecurity and LDAP integration in InduSoft Web Studio
Security and LDAP integration in InduSoft Web Studio
 
Graphical Interface Scaling in InduSoft Web Studio
Graphical Interface Scaling in InduSoft Web StudioGraphical Interface Scaling in InduSoft Web Studio
Graphical Interface Scaling in InduSoft Web Studio
 
What's New In InduSoft Web Studio 8.1
What's New In InduSoft Web Studio 8.1What's New In InduSoft Web Studio 8.1
What's New In InduSoft Web Studio 8.1
 
Introduction to InduSoft Web Studio 8.1
Introduction to InduSoft Web Studio 8.1Introduction to InduSoft Web Studio 8.1
Introduction to InduSoft Web Studio 8.1
 
What’s coming in InduSoft Web Studio 8.1
What’s coming in InduSoft Web Studio 8.1What’s coming in InduSoft Web Studio 8.1
What’s coming in InduSoft Web Studio 8.1
 
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-OPC Foundat...
 
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
Webinar: OPC UA Clients on Linux Systems with InduSoft Web Studio-InduSoft Pr...
 
Tips and Tricks for InduSoft Web Studio-August 2017
Tips and Tricks for InduSoft Web Studio-August 2017Tips and Tricks for InduSoft Web Studio-August 2017
Tips and Tricks for InduSoft Web Studio-August 2017
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

Cybersecurity Critical Infrastructure Framework Course Textbook and the class/curriculum for Security Certification

  • 2. Topics Covered • E-Book Purpose • Key Objectives • Outline Of Content • Training Plans – Cybersecurity Programs – Boot Camp • About ENMU-Ruidoso • Q & A? 2 CAE-2Y Accredited
  • 3. Purpose • Provide a quick reference guide to the framework • Promote awareness of – Cybersecurity Critical Infrastructure Framework – SCADA Cybersecurity threats and vulnerabilities – The importance of risk assessments – How to use the framework – Look into applying security to Indusoft Web Studio 3 CAE-2Y Accredited
  • 4. Key Objectives • Knowledge of SCADA and cybersecurity environment – Types of SCADA systems – Threats and risks • Understanding of framework • Knowledge of tools and processes for risk analysis • Ability to apply risk management processes to obtain the right framework tier for an organization. 4 CAE-2Y Accredited
  • 5. Outline Of Content • Chapter 1 - SCADA Cybersecurity Introduction and Review – What is SCADA – Overview of Cybersecurity Vulnerabilities – Understanding Control System Cyber Vulnerabilities • Chapter 2 – Cybersecurity Framework Introduction – Framework Introduction – Risk Management and – the Cybersecurity Framework 5 CAE-2Y Accredited
  • 6. Outline Of Content • Chapter 3 – Cybersecurity Framework Basics – Basic framework overview – Framework core • Chapter 4 – How to Use the Framework – Basic Review of Cybersecurity Practices – Establishing or Improving a Cybersecurity Program – Communicating Cybersecurity Requirements with Stakeholders • Chapter 5 – Indusoft Security Guide – Embedded in this chapter. 6 CAE-2Y Accredited
  • 7. Outline Of Content • Appendix (Framework Core, CSET Tool, References, and Glossary) 7 CAE-2Y Accredited
  • 9. Training Plans: Cybersecurity Programs • Computer and Network Security Certification Program (Online) Credited or Self-paced • This program is specifically designed to prepare students as Information Systems Security (INFOSEC) Professionals, NSTISSI No. 4011and CNSSI No. 4016 Entry Level Risk Analysts and is CAE-2Y Accredited. – IS 131: Network Security Fundamentals-3 – IS 136: Guide to Disaster Recovery- 3 – IS 153/L: Introduction to Information System- 4 – IS 253: Firewalls and How They Work- 3 – IS 257: Network Defense and Counter Measures- 3 – IS 258: Cyber Ethics, Professionalism, and Career Development- 3 9 CAE-2Y Accredited
  • 10. Training Plans: Cybersecurity Programs • Associates of Applied Science Degree - Information Systems Cybersecurity (Online) Credited (CAE-2Y,4011 & 4016-E, DOD 8570) Career pathway to 4-yr degrees • The focus of this program will be on the key components of information systems assurance and cybersecurity: – People – Software – Hardware – Data – Security – Communication technologies – How these components can be integrated and managed to create competitive advantage. 10 CAE-2Y Accredited
  • 11. Training Plans: Boot Camp • 4 day Boot Camp covering: – Course Orientation and Introduction to Cybersecurity and SCADA • CompTIA-Security+ Key Topics • SCADA Cybersecurity Recommended Practice/ Infrastructure Guiding Principles/National Infrastructure Protection Plan – IS-821 Critical Infrastructure and Key Resources Support Annex – IS-860.a National Infrastructure Protection Plan (NIPP) • Cybersecurity Critical Infrastructure Framework / CAP Process/Intro to a SCADA Product (IDUSOFT) • CSET Department of Homeland Security Risk Assessment Process and Tools Using the Cybersecurity Critical Infrastructure Framework 11 CAE-2Y Accredited
  • 12. About ENMU-Ruidoso  The National Security Agency and the Department of Homeland Security have designated Eastern New Mexico University - Ruidoso  National Center of Academic Excellence in Information Assurance/Cybersecurity Defense through academic year 2019.  Based on the universities ability to meet the increasing demands of the program criteria will serve the nation well in contributing to the protection of the National Information Infrastructure.  Meets the eleven Knowledge Units learning objectives  Recognized by the National Initiative in Cybersecurity Education (NICE) as a certified Training Institution for the NIST National Cybersecurity Workforce Framework.  http://csrc.nist.gov/nice/index.htm 12 CAE-2Y Accredited

Hinweis der Redaktion

  1. Chapter 1: This chapter will provide an introduction to Supervisory Control and Data Acquisition (SCADA), Distributed Control Systems (DCS), and Process Control Systems (PCS). What they are and how they are used. Then we will look at cybersecurity vulnerabilities in general and those that are of a higher concern for SCADA and PCS systems. Section 1: What is SCADA? Overview History and Installed Base How SCADA Systems Work A More In-Depth Look at a SCADA System Field Devices Measure the Process for Flow Rate, Pressure, Temperature, Level, Density, Etc. Field Control Uses Two Types of Controllers Examples of HMI Screens and Displays Used Within SCADA Systems Section 2: Overview of Cyber Vulnerabilities In this section the key objectives are: Challenges of Securing Information Understanding and Defining Information Security Cyber Threat Source to Control/SCADA Systems Descriptions GAO Threat Table Cyber-Attacks and Defenses Vulnerability Scanning vs. Penetration Testing Section 3: Understanding Control System Cyber Vulnerabilities Gaining Control of the SCADA System Three Categories of SCADA Systems Chapter 2: To strengthen the resilience of this infrastructure, President Obama issued Executive Order 13636 (EO), “Improving Critical Infrastructure Cybersecurity”, on February 12, 2013.1 This Executive Order calls for the development of a voluntary Cybersecurity Framework (“Framework”) that provides a “prioritized, flexible, repeatable, performance-based, and cost- effective approach” to manage cybersecurity risk for those processes, information, and systems directly involved in the delivery of critical infrastructure services. The Framework, developed in collaboration with industry, provides guidance to an organization on managing cybersecurity risk. Executive Order no. 13636, "Improving Critical Infrastructure Cybersecurity", DCPD-201300091, February 12,2013. http://www.gpo.gov/fdsys/pkg/FR-2013-02-19/pdf/2013-03915.pdf Chapter 2: Cybersecurity Framework Introduction Section 1: Framework Introduction Overview of the Framework Framework Core Framework Implementation Tiers Framework Profile Section 2: Risk Management and the Cybersecurity Framework Risk Management Redefined
  2. Chapter 3: The purpose of the Framework is to provide a common language to enable understanding, managing, and communicating cybersecurity risk both internally and externally. It is intended for use in helping identify and prioritize actions for reducing cybersecurity risk. The Framework is a tool, used for aligning policy, business, and technological approaches to managing that risk. It is meant to be used to manage cybersecurity risk across entire organization or can be focused to service, department within the organization. “Different types of entities - including sector coordinating structures, associations, and organizations - can use the Framework for different purposes, including the creation of common Profiles.” "Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0", National Institute of Standards and Technology, February 12, 2014 The ebook introduces a business process perspective in looking at the framework and how to apply the framework from a Business Process Re-engineering perspective. Chapter 3: Cybersecurity Framework Basics Section 1: Framework Basics Section 2: Framework Core Functions Categories Subcategories Framework Implementation Tiers Section 3: How Does it All Come Together? Coordination of Framework Implementation Business Process Management (BPM) Approach to the Framework Cybersecurity Framework Assessment Process Model Breakdown and Component Parts Chapter4: The purpose of this chapter is to look at how an organization can use the Framework as a key part or enabler of its current process for identifying, assessing, and managing cybersecurity risk. Note, the Framework is not designed to replace existing processes; an organization can use its current process and overlay it onto the Framework to determine gaps in its current cybersecurity risk approach and develop a roadmap to improvement. Using the Framework as a cybersecurity risk management tool, can enable the organization in determining activities that are most important to critical service delivery and prioritize the cost of those activities to reduce the risk and maximize the impact of the investment. Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0, National Institute of Standards and Technology, February 12, 2014 Chapter 4: How to Use the Framework Section 1: Basic Review of Cybersecurity Practices Section 2: Establishing or Improving a Cybersecurity Program Step 1: Prioritize and Scope Step 2: Orient Step 3: Create a Current Profile Step 4: Conduct a Risk Assessment Step 5: Create a Target Profile Step 6: Determine, Analyze, and Prioritize Gaps Step 7: Implement Action Plan Section 3: Communicating Cybersecurity Requirements with Stakeholders Identifying Gaps
  3. Appendix A: Framework Core Information regarding Informative References described in Appendix A may be found at the following locations: Appendix B: Cyber Security Evaluation Tool (CSET) Information Appendix C: References Recommended Publications for Purchase Further Reading and Links to Organizations Appendix D: Glossary Terms Used in this Publication Acronyms Used in this Publication CSET Tool The Cyber Security Evaluation Tool (CSET®) is a Department of Homeland Security (DHS) no-cost tool that assists organizations in protecting their key national cyber assets. The tool was developed by the DHS Industrial Control System Cyber Emergency Response Team (ICS-CERT) with assistance from the National Institute of Standards and Technology (NIST). This tool provides users with a systematic, consistent, and standards based approach for assessing the security posture of their Information Technology systems and networks. The tool uses high-level and detailed questions related to all industrial control and IT systems that includes the NIST Cybersecurity Critical Infrastructure Framework, referenced in the tool standards as “NCSF V1”. The value of the tool is that it can guide the key stakeholders, custodians, and owners in systematically understanding their current IT and control system environment, potential gaps in security, and assist in developing a plan to close those gaps. The tool includes instructional videos, help screens, and information not only about how to use the tool but information on what standards might apply to one’s organization. The tool gives organizations who have not conducted any sort of comprehensive risk assessment of the IT infrastructure, an excellent starting point.
  4. 1.1. Basic Data Analysis 1.2. Basic Scripting or Introductory Programming (4 yr core) 1.3. Cyber Defense 1.4. Cyber Threats 1.5. Fundamental Security Design Principles 1.6. IA Fundamentals 1.7. Intro to Cryptography 1.8. IT Systems Components 1.9. Networking Concepts 1.10. Policy, Legal, Ethics, and Compliance 1.11. System Administration