Which of the following would be MOST appropriate to secure an existing SCADA system by preventing
connections from unauthorized networks?
Implement a HIDS to protect the SCADA system
Implement a Layer 2 switch to access the SCADA system
Implement a firewall to protect the SCADA system
Implement a NIDS to protect the SCADA system
Firewalls manage traffic using filters, which is just a rule or set of rules. A recommended guideline for firewall
rules is, “deny by default; allow by exception”. This means that if a network connection is not specifically
allowed, it will be denied.