About This Chapter
Protecting Industrial Networks Using Security Access Controls - Chapter Summary
Security access controls are one important way that networks maintain their system security. The lessons in this chapter offer a thorough look into access control, how host security controls can be put into place, and industrial policies related to network security. We offer engaging lessons with which to delve into these topics, and the lessons can be viewed as many times as needed. After you have completed this chapter, you should be able to:
- Discuss what network security is
- Identify different types of access controls and commonly used types of network security systems
- Recognize an access control matrix, which offers different levels of security for different users of a network system
- Explain the concept of a network security perimeter
- Tell about the segmentation of networks for security purposes
- Describe specific ways to implement host security and access controls
- Develop a network security policy using best practices
1. Access Control: Types & Implementation
Access control is a critical element of any security implementation. In this lesson, we will identify and describe the various types of access controls, and provide an example implementation of access control in a business.
2. Access Control Matrix: Model & Example
An access control matrix is a single digital file assigning users and files different levels of security. We'll talk about access control models including: mandatory access, role-based access, discretionary access, and rule-based access.
3. Types of Network Security
Network security is a fundamental concept that is essential to any company using information technology. This lesson lists a few of the common types of network security systems and describes their role on the network.
4. Information Security Management Systems
Securing information is extremely important in today's day and age. In this lesson, we'll take a look at information security, what it is, what information security management is, and the systems that enforce it.
5. Security Perimeter: Definition, Solutions & Devices
In this lesson, you will learn the definition of security perimeter. Additionally, you will learn about the devices, equipment, and technologies used to secure a network's perimeter.
6. Network Segmentation in Industrial Networks: Process & Examples
In this lesson, we will learn about network segmentation and the need for it. We will also describe how industrial networks can be segmented in order to provide security and access control.
7. Implementing Host Security & Access Controls in Industrial Networks
In this lesson, we will discuss how security analysts implement security controls in industrial networks. We will also briefly review how the CIA triad is used to design security policies for industrial networks.
8. Information Security Policy: Framework & Best Practices
In this lesson, we will be looking at what information security policy is all about and frameworks which can be used in creating the policies in accordance with best practices.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Computer Science 330: Critical Infrastructure Security course
- Introduction to Industrial Networks & Control Systems
- Industrial Network Security & Threats
- Industrial Network Design & Architecture
- Network Protocols in Industrial Networks
- Risk Assessment & Vulnerability in Industrial Networks
- Implementing Secure Zones & Conduits in Industrial Networks
- Detecting Threats, Exceptions & Anomalies in Critical Infrastructure
- Monitoring the Security of Industrial Networks
- Policies, Procedures & Standards for ICS & SCADA Systems
- Required Assignments for Computer Science 330