ICS Computer Security

In this chapter, we will be exploring the computer security layer of the defense-in-depth model. At this point, the stacking of security measures becomes more noticeable. For example, in the previous chapter, we installed network perimeter firewalls to restrict certain network connections from getting established across security boundaries by blocking the corresponding network ports at the network perimeter. In this chapter, we will add backup security controls (additional layers of defense) by applying endpoint hardening and configuring a host-based firewall policy.

This chapter will cover the following topics:

  • Patch management
  • Anti-malware software
  • Endpoint protection software
  • Endpoint hardening
  • Application whitelisting ...

Get Industrial Cybersecurity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.