ICS Cybersecurity

7 Steps to Control System and SCADA System Security


Summary

In Step 1 of this article we suggested that you should not begin a journey until you know where you are starting from, where you want to go and how you are going to get there. We hope that the 7 steps described provide you with a roadmap to improve your plant’s cyber security defenses. After you complete them, however, you have really only completed the first leg of your journey.

Effective ICS and SCADA System security is not a one-time project. Rather it is an ongoing, iterative process. You will need to repeat the 7 steps and update materials and measures as systems, people, business objectives and threats change.

The reward for your effort will be maximum protection.


Page 9 of 9 pages « First < 7 8 9