Securing SCADA
Posted
tags:
篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了Securing SCADA相关的知识,希望对你有一定的参考价值。
Implementing secure SCADA
Securing SCADA is really a tough job when it has to be implementedpractically; however, we can look for some of the following key points when securing SCADA systems:
Keep an eye on every connection made to SCADA networks and figure outif any unauthorized attempts were made
Make sure all the network connections are disconnected when they arenot required
Implement all the security features provided by the system vendorsImplement IDPS technologies for both internal and external systems andapply incident monitoring for 24hours
Document all the network infrastructure and provide individual roles toadministrators and editors
Establish IR teams and blue teams for identifying attack vectors on aregular basis
Restricting networks
Networks can be restricted in the event of attacks related tounauthorized access, unwanted open services, and so on. Implementing the cure by removing or uninstallingservices is the best possible defense againstvarious SCADA attacks.
本文出自 “Ilovecat(个人笔记)” 博客,请务必保留此出处http://hj192837.blog.51cto.com/655995/1971401
以上是关于Securing SCADA的主要内容,如果未能解决你的问题,请参考以下文章
Securing Spring Cloud Microservices With OAuth2
Securing ASP.NET Core 2.0 Applications with JWTs
SpringCloud 学习-2 :Securing The Eureka Server
Securing web applications-011-把敏感信息请求转为https(requiresChannel())
SPRING IN ACTION 第4版笔记-第九章Securing web applications-004-对密码加密passwordEncoder
SPRING IN ACTION 第4版笔记-第九章Securing web applications-001-SpringSecurity简介(DelegatingFilterProxyAbstr(