7

Protecting Critical Infrastructure – Part 2

This chapter follows the foundational groundwork established in the previous chapter, where we explored network security, continuous monitoring, and the development of security policies and frameworks. This chapter takes a deeper dive, building on how to protect critical infrastructure comprehensively, covering systems security and endpoint protection. It aims to provide an extensive understanding of how to safeguard the various components of critical infrastructure against sophisticated and evolving cyber threats. Emphasizing the importance of robust endpoint security, the effectiveness of antivirus and antimalware solutions, endpoint detection and response (EDR), and several aspects of application ...

Get Critical Infrastructure Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.