A Defense-in-depth approach should use mixed deployment systems with some or all of the following tools:
· Scanning at the control system firewall
· Ingress/inbound and egress/outbound traffic
· Application whitelisting (AWL)
· Automatic updating for non-critical systems
· Systems with vendor approved update schemes
· Manual scheduled updates for more difficult systems
IC32M page 395
upvoted 2 times
...
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
ac873d6
8 months, 1 week ago