User talk:H.hossainabir

As the new approaches of the use of firewall is necessary to achieve optimal separation network based on ineternal separation. As Sung Gi Min (The network entity manages the mapping between the identifier and its IP address. The scheme excludes the vehicles from the mobility procedure, so a vehicle needs only the standard IPv6 protocol stack, and mobility signaling does not occur on the wireless link. March’2018). This particular thing seeks to expel government agencies for producing documents regarding the separation policies, guidance and data in response to freedom of information Act. The “ map-and-encapsulate protocol is basically developed through internet engineering task force LISP working group. The actual idea behind this separation to the network and the identifier will be in one number space, the IP address. Through LISP both the identifiers and the locators can be IP address or by arbitrary elements as for instance GPS coordinating with MAC address. The working taxonomy of the separation techniques also include three basic primary factors that are important. Security controls target. The threat and its area where from the source is generated. Using security control what approach is used. The initial step toward securing SCADA system is to create the security The first step towards securing SCADA systems is creating a written security policy, an essential component in protecting the corporate network. Failure to have a policy in place exposes the company to attacks, revenue loss and legal action. A security policy should also be a living document, not a static policy created once and shelved. The management team needs to draw very clear and understandable objectives, goals, rules and formal procedures to define the overall position and architecture of the plan. Main personnel such as senior management, IT department, human resources and the legal department all should be included in the plan. It should also cover the following key components: The aspect of preparing a written security policy is to perform a vulnerability assessment prior to completing the written policy. A vulnerability assessment is designed to identify both the potential risks associated with the different aspects of the SCADA-related IT infrastructure and the priority of the different aspects of the infrastructure. This would typically be presented in a hierarchical manner, which in turn sets the priority to address security concerns and the level of related funding associated with each area of vulnerability. For instance, within a typical SCADA environment, key items and the related hierarchy could be as follows: Operational Availability of Operator Stations Accuracy of Real Time Data Protection of System Configuration Data Interconnection to Business Networks Availability of Historical Da Availability of Casual User Stations