October 2018
Beginner
784 pages
17h 34m
English
Based on the scenarios in Chapter 6, you can see that protecting standalone Information Technology (IT) assets offers many challenges. Local host (Computing and Intelligent Control Device) security is implemented on multiple levels that include physical denial of use, limited access to system resources, and active protection against individuals and software intent on corrupting or stealing data. In this chapter, you’ll learn to:
If you think of standalone IT or ICS devices in terms of the three layers of security ...