欢迎光临
我们一直在努力

Securing SCADA

Implementing secure SCADA

Securing SCADA is really a tough job when it has to be implementedpractically; however, we can look for some of the following key points when securing SCADA systems:

  • Keep an eye on every connection made to SCADA networks and figure outif any unauthorized attempts were made

  • Make sure all the network connections are disconnected when they arenot required
    Implement all the security features provided by the system vendors

  • Implement IDPS technologies for both internal and external systems andapply incident monitoring for 24hours

  • Document all the network infrastructure and provide individual roles toadministrators and editors

  • Establish IR teams and blue teams for identifying attack vectors on aregular basis

 

Restricting networks

Networks can be restricted in the event of attacks related tounauthorized access, unwanted open services, and so on. Implementing the cure by removing or uninstallingservices is the best possible defense againstvarious SCADA attacks.

赞(0)
【声明】:本博客不参与任何交易,也非中介,仅记录个人感兴趣的主机测评结果和优惠活动,内容均不作直接、间接、法定、约定的保证。访问本博客请务必遵守有关互联网的相关法律、规定与规则。一旦您访问本博客,即表示您已经知晓并接受了此声明通告。