It is a term paper.The topic is ‘Rockwell Automation – Factory Talk (SCADA)’ The paper shall be at least five (5) and no more than ten (10) pages in length excluding figures, tables, and references. The paper shall be formatted using an 11-point font of either Arial, Helvetica, or Times Roman type using 1″ margins on the sides and double-spacing between lines with 0.5″ indentation on first line of paragraphs. The paper shall be written using the APA style guide seventh edition published in October 2019. Online guidance can be viewed at https://apastyle.apa.org.All tables and figures shall be captioned and specifically referenced in the body of the document. All references shall be stated and included as endnotes in this paper. Citations must meet the following requirements:
- No more than two (2) citations shall be from Wikipedia
- At least two (2) references shall be from United States government sites (e.g. CISA, NIST)
- At least two (2) references from vendor web (html) or printed (pdf) material
- At least two (2) references shall be from independent sources including but not limited to
- News Media Outlets (e.g. Reuters, Washington Post, Wired, CSOOnline)
- Industry Publications (e.g. Automation, ISSSource, Control)
- Trade Sources (e.g. Oil and Gas Journal, ChemWeek, PharmaTimes)
- Security Solution Providers (e.g. McAfee, Trend Micro, Dragos, Claroty) to name several.
The section titles (paper) and slide titles (presentation) in the templates are for reference only.Your paper and presentation shall address and develop each of the following items:
- System overview (textual) and architecture (graphical) covering devices and network topology explaining the function of each of the key assets
- Communication protocols used by the system
- Industry sectors that use the system
- Vulnerabilities publicly disclosed for the system and the publication of any exploitation packages
- Potential or actual impact of the vulnerabilities discovered to the industry sectors served
- Cyber security measures taken by the vendor to secure the system
- Additional cyber security measures that could be taken by the end-user user if the vendor recommendations are not feasible (e.g. an upgrade could not be performed in a timely manner)
Must have the following categories