O'Reilly logo

Industrial Network Security, 2nd Edition by Joel Thomas Langill, Eric D. Knapp

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10

Implementing Security and Access Controls

Abstract

With a properly designed and segmented network, there is still the danger of a targeted cyber-attack. To defend these important networks, it is important to know which endpoint- and network-based cyber security controls are available, and how best to use them.

Keywords

Network Security
Firewall
IDS
IPS
DPI
Anti-virus
Application Whitelisting
Data Diodes
Host IDS
Information in this chapter
Network Segmentation
Implementing Network Security Controls
Implementing Host Security and Access Controls
How Much Security is Enough?
Once security zones and the associated conduits connecting these zones have been defined (see Chapter 9, “Establishing Zones and Conduits”), they ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required