ICS Computer Security

In this chapter, we will be exploring the computer security layer of the defense-in-depth model. At this point, the stacking of security measures becomes more noticeable. For example, in the previous chapter, we installed network perimeter firewalls to restrict certain network connections from getting established across security boundaries by blocking the corresponding network ports at the network perimeter. In this chapter, we will add backup security controls (additional layers of defense) by applying endpoint hardening and configuring a host-based firewall policy.

This chapter will cover the following topics:

  • Patch management
  • Anti-malware software
  • Endpoint protection software
  • Endpoint hardening
  • Application whitelisting software
  • Monitoring and logging
  • Configuration/change management—software updates
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.117.103.219