We are going to look at the various security frameworks in use today in cybersecurity. You will need to look at your organization’s security framework policies from ISSC479 Week 3 assignment and compare it to a security framework policies for a general computer company.
Step 1: Obviously our first step is to locate a security framework policy that is publicly available?
Step 2: Once you have completed your research and found a policy to match-up you will begin the process of comparing and contrasting the two security framework policies.
Step 3: Once you have gathered up all the information from your comparing and contrasting, you will want to put together a list of the differences and describe why these differences exist. Finally, you will also want to do an additional 1-2 pages of discussion on whether you think that the security framework and the policies derived from it in ICS and SCADA are truly secure or does the industry need to do more to increase security?