In this video, we will discuss the second step of the NIST framework: Protect.
The purpose of this step is to take preventative measures in protecting our industrial control systems.
In this video, we will discuss the third step of the NIST framework, which is called “Detect”.
After identifying and protecting your devices, you will want to have systems in place to monitor them in order to ensure that the protections are working properly and to detect any unusual activity.
In this video, we will discuss the two steps of the NIST framework: “Respond” and “Recover”
Responses to a cyber-attack may include restoring backups, changing firewall rules, blocking IP addresses, modifying permissions, or using automated intrusion prevention systems to block suspicious traffi...
2 Comments