About This Chapter
Monitoring the Security of Industrial Networks - Chapter Summary
A major way to stop threats to industrial networks is the establishment of appropriate monitoring systems. Within this chapter, you'll be introduced to concepts related to the challenge of deciding what to monitor on industrial networks, intrusion prevention and detection systems, and other ways of monitoring industrial systems. Using these materials is a great way to master these concepts. Short video lessons are prepared by experts in the industry, so you'll be sure you're up-to-date regarding the latest concepts. After working through this chapter's materials, you'll be able to:
- Choose what to monitor on industrial networks
- Describe data security and intrusion detection systems
- Explain network segmentation and IP subnetting
- Discuss intrusion prevention systems and how they work
- Demonstrate a thorough understanding of networks, including how to test network security, tools to test security, and network security audits
- Develop a network security policy
- Tell about controls and control frameworks
- Recognize the concept of continual improvement
1. Selecting Critical Infrastructure Components to Monitor in Industrial Networks: Methods & Examples
In this lesson, we will discuss the process that can be used to help determine which components to monitor in a network. Additionally, we will review an example of how this is accomplished in an industrial setting.
2. Intrusion Detection Systems (IDS) in Data Security
In this lesson, we'll take a look at data security, what it is, what intrusion detection systems are, some types of intrusion detection systems, and some methods used for intrusion detection.
3. Network Segmentation & IP Subnetting: Definition & Processes
In this lesson, we will learn about what is Network Segmentation and why we need to segment a network. We will also discuss about how to achieve Network Segmentation using IP Subnetting.
4. Intrusion Prevention System (IPS): Definition & Types
An intrusion prevention system is an added layer of protection for your computer network. In this lesson, you'll learn more about this system, how it works, and what it does to safeguard your network.
5. How to Test Network Security
A network is the foundation of most businesses these days. In this lesson, we'll take a look at network security: what it is, how to test it, and some tools that can be used for testing.
6. Network Security Audit: Tools & Checklist
Networks are important tools in business today. In this lesson, we'll take a look at network security, audits, tools you might use in an audit, and a checklist for performing it.
7. What is a Network Security Policy? - Procedures & Examples
In most group activities, we use rules for common behavior. Using a network in a group setting is no different; there are rules for computer access in order to protect the data. In this lesson, we'll define what a network security policy is and discuss its usage.
8. What Is Continual Improvement? - Definition & Process
Quality management is all about making things better through identifying improvement opportunities and striving towards a stated goal. Learn the definition of continual improvement, how it can be applied, and why it is so important to use.
9. Information Technology Control Frameworks Overview
Controls are vital in information technology. They help ensure data integrity and compliance, and are useful assets to use when auditing. This lesson will provide an overview of controls and control frameworks.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Computer Science 330: Critical Infrastructure Security course
- Introduction to Industrial Networks & Control Systems
- Industrial Network Security & Threats
- Industrial Network Design & Architecture
- Network Protocols in Industrial Networks
- Risk Assessment & Vulnerability in Industrial Networks
- Implementing Secure Zones & Conduits in Industrial Networks
- Protecting Industrial Networks Using Security & Access Controls
- Detecting Threats, Exceptions & Anomalies in Critical Infrastructure
- Policies, Procedures & Standards for ICS & SCADA Systems
- Required Assignments for Computer Science 330