Chapter 10

Implementing Security and Access Controls

Abstract

With a properly designed and segmented network, there is still the danger of a targeted cyber-attack. To defend these important networks, it is important to know which endpoint- and network-based cyber security controls are available, and how best to use them.

Keywords

Network Security
Firewall
IDS
IPS
DPI
Anti-virus
Application Whitelisting
Data Diodes
Host IDS
Information in this chapter
Network Segmentation
Implementing Network Security Controls
Implementing Host Security and Access Controls
How Much Security is Enough?
Once security zones and the associated conduits connecting these zones have been defined (see Chapter 9, “Establishing Zones and Conduits”), they ...

Get Industrial Network Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.