您的位置:首页 > 其它

Securing SCADA

2017-10-11 13:40 260 查看
Implementing secure SCADA
Securing SCADA is really a tough job when it has to be implementedpractically; however, we can look for some of the following key points when securing SCADA systems:
Keep an eye on every connection made to SCADA networks and figure outif any unauthorized attempts were made

Make sure all the network connections are disconnected when they arenot required
Implement all the security features provided by the system vendors

Implement IDPS technologies for both internal and external systems andapply incident monitoring for 24hours

Document all the network infrastructure and provide individual roles toadministrators and editors

Establish IR teams and blue teams for identifying attack vectors on aregular basis

Restricting networks
Networks can be restricted in the event of attacks related tounauthorized access, unwanted open services, and so on. Implementing the cure by removing or uninstallingservices is the best possible defense againstvarious SCADA attacks.
内容来自用户分享和网络整理,不保证内容的准确性,如有侵权内容,可联系管理员处理 点击这里给我发消息
标签:  scada