You would also honest accept as true with been asked to position up a transient background paper for Sifers-Grayson IT personnel about the importance of being ready to answer to industry disruptions coming up from (a) natural mess ups and (b) cyber attacks. Such disruptions can adversely impact the offer of IT products and companies and, in flip, forestall the industry from conducting operations over a long timeframe. The patron has requested that you focal level upon the industry reasons in the support of the need for formal anxiety restoration procedures and industry continuity plans. Your deliverable needs to be written as a background paper containing at least 7 stable paragraphs.
You are going to must protect out additional reading and research sooner than you put collectively your paper. The FEMA net place apart of abode https://www.ready.gov is an even space to start.
Provide in-textual content citations and references for 3 or extra authoritative sources. Effect the reference checklist at the live of your posting.
Remark join sources Then add your research to it please
-
Sifers-GraysonOverviewPresentationSlidesv2.pdf
Sifers‐Grayson Instruct Stare & Security Posture Overview
Ready by: Nofsinger Consulting Services and products, LLC
C
S Pervasive Cybersecurity is our passion …
PRELIMINARY – NOT FOR DISTRIBUTION
Company Background
• Founded by Ira John Sifers and John Michael Cole in 1974
• Based entirely in Pine Knob, Grayson County, Kentucky • Located in the Appalachian Financial Vogue Situation
• Industrial areas: – Industrial Defend watch over Programs for Developed Manufacturing & Utilities
– R&D for Drones and Robots
Sifers‐Grayson CEO
Chief Working Officer
Finance & Accounting Personnel Engineering
R&D Dev Lab
Scada Increase Lab
Test Differ
Mission Administration Gross sales & Increase
Sifers‐Grayson Group Chart
Mary Beth Sifers
Ira John Sifers, III
Michael Coles, Jr.
Customer Sad
• Developed Manufacturing Companies • Utility Companies • U.S. Department of Protection • U.S. Department of Set of beginning Security
SITE SURVEY A Rapid Survey at the SG Accomplishing Structure
Resolve 1. Overview of Sifers‐Grayson Accomplishing IT Structure
Resolve 2. Combined Networks and Programs Views: Sifers‐Grayson Headquarters, R&D Center, and Data Center
Resolve 3. Combined Networks and Programs Views: Sifers‐Grayson Engineering Center
Resolve 4. Combined Communications, Networks and Programs Views: Sifers‐Grayson Test Differ and R&D Center
Resolve 5. Combined Networks and Programs Views: Sifers‐Grayson SCADA Increase Lab
Resolve 6. Combined Networks and Programs Research: Sifers‐Grayson R&D DevOps Lab
Chance Panorama
Sifers‐Grayson Security Posture Overview
C
S Pervasive Cybersecurity is our passion …
PRELIMINARY – NOT FOR DISTRIBUTION
Chance Panorama for Sifers‐Grayson SCADA Lab
SCADA Increase Lab
Offer Cage
Inventory Defend watch over Device
PROM Burner
Programing Workstations
Modems
Diagnostics Workstations
Checking out Workstation
SCADA Test Jig
External Chance Sources
External Chance Sources
Inner Chance Sources
Offer Chain Threats Windows 8.1
Windows 8.1
Malware ThreatsMalware
Threats
“Sneaker‐Win” Threats
Chance Panorama for Sifers‐Grayson R&D DevOps Lab
Telemetry Links • Explain & Defend watch over • Sensor Data • Housekeeping Data • Debugging Data
R&D DevOps Lab
Offer Cage
Inventory Defend watch over Device
PROM Burner
Programing Workstations
DevOps Workstations
Test & Simulation Workstation
PLC / PROM Test Jig
Connection to Company Campus Home
Community
R&D Servers
Web
Test Vehicles
Modems
Inner Chance Sources
Windows 8.1Supply Chain Threats
“Sneaker‐Win” Threats
“RF‐Win” Threats
External Threats
Inner & External Threats
Windows 10
Windows 10Windows 10 Malware
Malware
U til iti es
Web
Data Center
E-mail, Web, and Database Servers
Campus Home Community (Wired)
Wireless Uncover admission to Point
Wireless Devices
Chance Panorama for Accomplishing IT Programs
R&D Center
Company Areas of work
Excessive Velocity Fiber Optic
Cable (Buried)
Copper Cable from
Telco (buried)
SV‐1
Firewall
Backdoor into Accomplishing Community
Vulnerable Device
Lacking IDS / IDPS
Inner Chance Sources
Lacking IDS / IDPS
E-mail, Web Site traffic
“Rapid Survey” Strategies & Next Steps
Sifers‐Grayson Security Posture Overview
C
S Pervasive Cybersecurity is our passion …
PRELIMINARY – NOT FOR DISTRIBUTION
Components Summary 1. Newly obtained authorities contracts now require compliance
with DFARS §252.204‐7008, 7009, and 7012 – http://www.acq.osd.mil/dpap/dars/dfars/html/present/25 2204.htm
– http://www.acq.osd.mil/se/docs/DFARS‐data.pdf 2. Derivative requirements consist of:
– Implementation of and compliance with NIST SP 800‐171 Holding Managed Unclassified Info in Nonfederal Info Programs and Organizations http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST. SP.800‐171.pdf
– Compliance with DFARS 252.239‐7009 Representation of Remark of Cloud Computing and 7010 Cloud Computing Services and products (watch http://www.acq.osd.mil/dpap/dars/dfars/html/present/25 2239.htm)
Additional Derivative Necessities
• Remark NIST Guidance Paperwork for – Incident Response, e.g. NIST SP‐800‐61 (Computer Security Incident Facing Info)
– SCADA Security, e.g. NIST SP 800‐82 (Info to Industrial Defend watch over Programs Security)
– Application / Programs Vogue Lifecycle (SDLC) Security, e.g. NIST SP 800‐64 (Security Considerations in the Device Vogue Lifestyles Cycle)
– Configuration Administration, e.g. NIST sp 800‐128 (Info for Security‐Targeted Configuration Administration of Info Programs)
Strategies • Speedy (Phase I)
– Rob away relate network connection between Company Campus Home Community (CCAN) and R&D Center’s LAN
– Set up a VPN answer to allow R&D Center to obtain entry to CCAN and inside sources from the Web
– Set up backup network connections from TELCO to CCAN and TELCO to R&D LAN
• Rationale – Phase network to lower inside & exterior dangers from CCAN to Test Differ, SCADA Lab, and R&D DevOps Lab
– Restrict the “reach” of the customer’s requirements (per DFARS & NIST steering) to the smallest allowable footprint
– Provide backup connectivity to WAN for industry continuity
C
S Pervasive Cybersecurity is our passion …
• Strategies (Phase II) – Take into yarn & Suggest Acquisitions for Security Solutions to toughen the company’s IT security posture 1. Waste Point Protection Platforms 2. Utility Lifecycle Administration 3. Identity Governance & Administration 4. Security Info & Match Administration
– Make Incident Response Handbook & Guidance
C
S Pervasive Cybersecurity is our passion …
• Strategies (Phases III, IV, V, and so forth.) – Originate security operations crew led by devoted CISO – Establish, evaluate and enhance Inner Processes for IT security
– Enforce IT Security Governance & Accomplishing Chance Administration
– Place Security Operations Center – Upgrade security dwelling equipment to consist of advanced network monitoring and intrusion detection and prevention systems
– Join data sharing and evaluation heart – … additional suggestions to be made after extra investigation and evaluate
C
S Pervasive Cybersecurity is our passion …
“After Action” Overview: Sifers‐Grayson
Sifers‐Grayson Security Posture Overview
C
S Pervasive Cybersecurity is our passion …
PRELIMINARY – NOT FOR DISTRIBUTION
The customer’s feedback
• Stunned at the extent of the issues • Dismayed at the capability liabilities and contractual components
• Concerned about the charges • Obvious no longer to let expertise stand in the system of progress
• Agreed to put into effect Phase I and II suggestions
Additional Negotiated Work
• NCS “Red Team” will conduct pentration test within subsequent 60 days
• NCS will place & put collectively Sifers‐Grayson Incident Response Team
• NCS will present a contract CISO to Sifers‐ Grayson for 180 days (renewable on a yearly basis thereafter)
• NCS will present additional crew & products and companies at negotiated charges
- WE OFFER THE BEST CUSTOM PAPER WRITING SERVICES. WE HAVE DONE THIS QUESTION BEFORE, WE CAN ALSO DO IT FOR YOU.
- Assignment status: Already Solved By Our Experts
- (USA, AUS, UK & CA PhD. Writers)
- CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS
QUALITY: 100% ORIGINAL PAPER – NO ChatGPT.NO PLAGIARISM – CUSTOM PAPER
Looking for unparalleled custom paper writing services? Our team of experienced professionals at AcademicWritersBay.com is here to provide you with top-notch assistance that caters to your unique needs.
We understand the importance of producing original, high-quality papers that reflect your personal voice and meet the rigorous standards of academia. That’s why we assure you that our work is completely plagiarism-free—we craft bespoke solutions tailored exclusively for you.
Why Choose AcademicWritersBay.com?
- Our papers are 100% original, custom-written from scratch.
- We’re here to support you around the clock, any day of the year.
- You’ll find our prices competitive and reasonable.
- We handle papers across all subjects, regardless of urgency or difficulty.
- Need a paper urgently? We can deliver within 6 hours!
- Relax with our on-time delivery commitment.
- We offer money-back and privacy guarantees to ensure your satisfaction and confidentiality.
- Benefit from unlimited amendments upon request to get the paper you envisioned.
- We pledge our dedication to meeting your expectations and achieving the grade you deserve.
Our Process: Getting started with us is as simple as can be. Here’s how to do it:
- Click on the “Place Your Order” tab at the top or the “Order Now” button at the bottom. You’ll be directed to our order form.
- Provide the specifics of your paper in the “PAPER DETAILS” section.
- Select your academic level, the deadline, and the required number of pages.
- Click on “CREATE ACCOUNT & SIGN IN” to provide your registration details, then “PROCEED TO CHECKOUT.”
- Follow the simple payment instructions and soon, our writers will be hard at work on your paper.
AcademicWritersBay.com is dedicated to expediting the writing process without compromising on quality. Our roster of writers boasts individuals with advanced degrees—Masters and PhDs—in a myriad of disciplines, ensuring that no matter the complexity or field of your assignment, we have the expertise to tackle it with finesse. Our quick turnover doesn’t mean rushed work; it means efficiency and priority handling, ensuring your deadlines are met with the excellence your academics demand.