It is a term paper.The topic is Rockwell Automation Factory Talk SCADAThe paper shall be at least five 5 and

It is a term paper.The topic is
Rockwell Automation – Factory Talk (SCADA)
The paper shall be at least five (5) and no more than ten (10) pages in length excluding figures, tables, and references. The paper shall be formatted using an 11-point font of either Arial, Helvetica, or Times Roman type using 1 margins on the sides and double-spacing between lines with 0.5 indentation on first line of paragraphs.
The paper shall be written using the APA style guide seventh edition published in October 2019. Online guidance can be viewed at https://apastyle.apa.org.All tables and figures shall be captioned and specifically referenced in the body of the document. All references shall be stated and included as endnotes in this paper. Citations must meet the following requirements:
No more than two (2) citations shall be from Wikipedia
At least two (2) references shall be from United States government sites (e.g. CISA, NIST)
At least two (2) references from vendor web (html) or printed (pdf) material
At least two (2) references shall be from independent sources including but not limited to
News Media Outlets (e.g. Reuters, Washington Post, Wired, CSOOnline)
Industry Publications (e.g. Automation, ISSSource, Control)
Trade Sources (e.g. Oil and Gas Journal, ChemWeek, PharmaTimes)
Security Solution Providers (e.g. McAfee, Trend Micro, Dragos, Claroty) to name several.
The section titles (paper) and slide titles (presentation) in the templates are for reference only.Your paper and presentation shall address and develop each of the following items:
System overview (textual) and architecture (graphical) covering devices and network topology explaining the function of each of the key assets
Communication protocols used by the system
Industry sectors that use the system
Vulnerabilities publicly disclosed for the system and the publication of any exploitation packages
Potential or actual impact of the vulnerabilities discovered to the industry sectors served
Cyber security measures taken by the vendor to secure the system
Additional cyber security measures that could be taken by the end-user user if the vendor recommendations are not feasible (e.g. an upgrade could not be performed in a timely manner)
Must have the following categories
INTRODUCTION
System Overview and Architecture
Market Analysis and Typical Use Case(s)
Major Vulnerability Disclosures
Impact Analysis
Risk Reduction Recommendations
Conclusion

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions