Ch 9: Monitoring the Security of Industrial Networks

About This Chapter

You can use the lessons in this chapter to learn more about how network specialists monitor the security of industrial networks. Whether you are an aspiring computer scientist or wish to be sure your network is using best security practices, you are in the right place to increase your knowledge on this crucial topic.

Monitoring the Security of Industrial Networks - Chapter Summary

A major way to stop threats to industrial networks is the establishment of appropriate monitoring systems. Within this chapter, you'll be introduced to concepts related to the challenge of deciding what to monitor on industrial networks, intrusion prevention and detection systems, and other ways of monitoring industrial systems. Using these materials is a great way to master these concepts. Short video lessons are prepared by experts in the industry, so you'll be sure you're up-to-date regarding the latest concepts. After working through this chapter's materials, you'll be able to:

  • Choose what to monitor on industrial networks
  • Describe data security and intrusion detection systems
  • Explain network segmentation and IP subnetting
  • Discuss intrusion prevention systems and how they work
  • Demonstrate a thorough understanding of networks, including how to test network security, tools to test security, and network security audits
  • Develop a network security policy
  • Tell about controls and control frameworks
  • Recognize the concept of continual improvement

9 Lessons in Chapter 9: Monitoring the Security of Industrial Networks
Test your knowledge with a 30-question chapter practice test
Selecting Critical Infrastructure Components to Monitor in Industrial Networks: Methods & Examples

1. Selecting Critical Infrastructure Components to Monitor in Industrial Networks: Methods & Examples

In this lesson, we will discuss the process that can be used to help determine which components to monitor in a network. Additionally, we will review an example of how this is accomplished in an industrial setting.

Intrusion Detection Systems (IDS) in Data Security

2. Intrusion Detection Systems (IDS) in Data Security

In this lesson, we'll take a look at data security, what it is, what intrusion detection systems are, some types of intrusion detection systems, and some methods used for intrusion detection.

Network Segmentation & IP Subnetting: Definition & Processes

3. Network Segmentation & IP Subnetting: Definition & Processes

In this lesson, we will learn about what is Network Segmentation and why we need to segment a network. We will also discuss about how to achieve Network Segmentation using IP Subnetting.

Intrusion Prevention System (IPS): Definition & Types

4. Intrusion Prevention System (IPS): Definition & Types

An intrusion prevention system is an added layer of protection for your computer network. In this lesson, you'll learn more about this system, how it works, and what it does to safeguard your network.

How to Test Network Security

5. How to Test Network Security

A network is the foundation of most businesses these days. In this lesson, we'll take a look at network security: what it is, how to test it, and some tools that can be used for testing.

Network Security Audit: Tools & Checklist

6. Network Security Audit: Tools & Checklist

Networks are important tools in business today. In this lesson, we'll take a look at network security, audits, tools you might use in an audit, and a checklist for performing it.

What is a Network Security Policy? - Procedures & Examples

7. What is a Network Security Policy? - Procedures & Examples

In most group activities, we use rules for common behavior. Using a network in a group setting is no different; there are rules for computer access in order to protect the data. In this lesson, we'll define what a network security policy is and discuss its usage.

What Is Continual Improvement? - Definition & Process

8. What Is Continual Improvement? - Definition & Process

Quality management is all about making things better through identifying improvement opportunities and striving towards a stated goal. Learn the definition of continual improvement, how it can be applied, and why it is so important to use.

Information Technology Control Frameworks Overview

9. Information Technology Control Frameworks Overview

Controls are vital in information technology. They help ensure data integrity and compliance, and are useful assets to use when auditing. This lesson will provide an overview of controls and control frameworks.

Chapter Practice Exam
Test your knowledge of this chapter with a 30 question practice chapter exam.
Not Taken
Practice Final Exam
Test your knowledge of the entire course with a 50 question practice final exam.
Not Taken

Earning College Credit

Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Support