温馨提示×

温馨提示×

您好,登录后才能下订单哦!

密码登录×
登录注册×
其他方式登录
点击 登录注册 即表示同意《亿速云用户服务条款》

Securing SCADA

发布时间:2020-07-05 10:17:55 来源:网络 阅读:551 作者:hj192837 栏目:建站服务器

Implementing secure SCADA

Securing SCADA is really a tough job when it has to be implementedpractically; however, we can look for some of the following key points when securing SCADA systems:

  • Keep an eye on every connection made to SCADA networks and figure outif any unauthorized attempts were made

  • Make sure all the network connections are disconnected when they arenot required
    Implement all the security features provided by the system vendors

  • Implement IDPS technologies for both internal and external systems andapply incident monitoring for 24hours

  • Document all the network infrastructure and provide individual roles toadministrators and editors

  • Establish IR teams and blue teams for identifying attack vectors on aregular basis

 

Restricting networks

Networks can be restricted in the event of attacks related tounauthorized access, unwanted open services, and so on. Implementing the cure by removing or uninstallingservices is the best possible defense againstvarious SCADA attacks.


向AI问一下细节

免责声明:本站发布的内容(图片、视频和文字)以原创、转载和分享为主,文章观点不代表本网站立场,如果涉及侵权请联系站长邮箱:is@yisu.com进行举报,并提供相关证据,一经查实,将立刻删除涉嫌侵权内容。

AI