您好,登錄后才能下訂單哦!
Implementing secure SCADA
Securing SCADA is really a tough job when it has to be implementedpractically; however, we can look for some of the following key points when securing SCADA systems:
Keep an eye on every connection made to SCADA networks and figure outif any unauthorized attempts were made
Make sure all the network connections are disconnected when they arenot required
Implement all the security features provided by the system vendors
Implement IDPS technologies for both internal and external systems andapply incident monitoring for 24hours
Document all the network infrastructure and provide individual roles toadministrators and editors
Establish IR teams and blue teams for identifying attack vectors on aregular basis
Restricting networks
Networks can be restricted in the event of attacks related tounauthorized access, unwanted open services, and so on. Implementing the cure by removing or uninstallingservices is the best possible defense againstvarious SCADA attacks.
免責(zé)聲明:本站發(fā)布的內(nèi)容(圖片、視頻和文字)以原創(chuàng)、轉(zhuǎn)載和分享為主,文章觀點不代表本網(wǎng)站立場,如果涉及侵權(quán)請聯(lián)系站長郵箱:is@yisu.com進行舉報,并提供相關(guān)證據(jù),一經(jīng)查實,將立刻刪除涉嫌侵權(quán)內(nèi)容。