It is a term paper.The topic is Rockwell Automation – Factory Talk (SCADA)The paper shall be at least five (5) and no more than ten (10) pages in length excluding figures, tables, and references. The paper shall be formatted using an 11-point font of either Arial, Helvetica, or Times Roman type using 1 margins on the sides and double-spacing between lines with 0.5 indentation on first line of paragraphs.The paper shall be written using the APA style guide seventh edition published in October 2019. Online guidance can be viewed at https://apastyle.apa.org.All tables and figures shall be captioned and specifically referenced in the body of the document. All references shall be stated and included as endnotes in this paper. Citations must meet the following requirements:No more than two (2) citations shall be from WikipediaAt least two (2) references shall be from United States government sites (e.g. CISA, NIST)At least two (2) references from vendor web (html) or printed (pdf) materialAt least two (2) references shall be from independent sources including but not limited toNews Media Outlets (e.g. Reuters, Washington Post, Wired, CSOOnline)Industry Publications (e.g. Automation, ISSSource, Control)Trade Sources (e.g. Oil and Gas Journal, ChemWeek, PharmaTimes)Security Solution Providers (e.g. McAfee, Trend Micro, Dragos, Claroty) to name several.The section titles (paper) and slide titles (presentation) in the templates are for reference only.Your paper and presentation shall address and develop each of the following items:System overview (textual) and architecture (graphical) covering devices and network topology explaining the function of each of the key assetsCommunication protocols used by the systemIndustry sectors that use the systemVulnerabilities publicly disclosed for the system and the publication of any exploitation packagesPotential or actual impact of the vulnerabilities discovered to the industry sectors servedCyber security measures taken by the vendor to secure the systemAdditional cyber security measures that could be taken by the end-user user if the vendor recommendations are not feasible (e.g. an upgrade could not be performed in a timely manner)Must have the following categoriesINTRODUCTIONSystem Overview and ArchitectureMarket Analysis and Typical Use Case(s)Major Vulnerability DisclosuresImpact AnalysisRisk Reduction RecommendationsConclusion