11: Implementing Security and Access Controls

Abstract

With a properly designed and segmented network, there is still the danger of a targeted cyberattack. To defend these important networks, it is important to know which endpoint- and network-based cybersecurity controls are available and how best to use them.

Keywords

Antimalware; Antivirus; Application whitelisting; Data diodes; DPI; Firewall; Host IDS; IDS; IPS; Microsegmentation; Network security
Information in this chapter
• Network Segmentation
• Implementing Network Security Controls
• Implementing Security Controls on Removable Media
• Implementing Host Security and Access Controls
• From Theory to Practice
• How Much Security is Enough?

Once security ...

Get Industrial Network Security, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.