Summary

This concludes the discussion about the security in-depth model. In the following chapters, we will go into more detail on every individual layer and see how the security controls for the particular security layer are applied to typical ICS environments, including configuration exercises of common security applications and software.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.118.23.147