O'Reilly logo

Mastering Metasploit by Nipun Jaswal

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Securing SCADA

Securing SCADA networks is the primary goal for any penetration tester on the job. Let's see the following section and learn how we can implement SCADA services securely and impose restriction on it.

Implementing secure SCADA

Securing SCADA is really a tough job when it is to be practically implemented; however, we can look for some of the following key points when securing SCADA systems:

  • Keep an eye on every connection made to SCADA networks and figure out if any unauthorized attempts were made
  • Make sure all network connections are disconnected when not required
  • Do implement all the security features provided by the system vendors
  • Implement IDPS technologies for both internal and external systems and apply incident monitoring for 24 ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required