Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

Application Server

Secure the host

  • Last UpdatedJul 19, 2024
  • 1 minute read

Given the sensitive nature of industrial control, it is important to secure not only the ICS software, but also:

  • the host on which it runs

  • the network to which it is connected

  • the hardware used for the ICS software.

    Note: The "host" is the Windows computer or Windows Embedded device on which your ICS software is installed and running.

There are several factors to consider for securing the host including:

  • Access to the host

  • Keeping track of and applying the latest Windows updates

  • Keeping the host computer free of viruses and malware

  • Protecting the applications and content on the host

Each of these factors is covered in the sections below.

TitleResults for “How to create a CRG?”Also Available in