Book Image

Mastering Metasploit

By : Nipun Jaswal
Book Image

Mastering Metasploit

By: Nipun Jaswal

Overview of this book

Table of Contents (17 chapters)
Mastering Metasploit
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Securing SCADA


Securing SCADA networks is the primary goal for any penetration tester on the job. Let's see the following section and learn how we can implement SCADA services securely and impose restriction on it.

Implementing secure SCADA

Securing SCADA is really a tough job when it is to be practically implemented; however, we can look for some of the following key points when securing SCADA systems:

  • Keep an eye on every connection made to SCADA networks and figure out if any unauthorized attempts were made

  • Make sure all network connections are disconnected when not required

  • Do implement all the security features provided by the system vendors

  • Implement IDPS technologies for both internal and external systems and apply incident monitoring for 24 hours

  • Document all network infrastructure and provide individual roles to administrators and editors

  • Establish IRT teams or red teams for identifying attack vectors on a regular basis

Restricting networks

Networks can be restricted in the event of attacks...