Chapter 5: Applying Cybersecurity

  1. People, technology, and operating methods
  2. TCP session modelling
  1. Being able to create and deploy the devices acting as dual-homes in a specific network 
  2. Building logical networks that share the same physical infrastructure
  3. Allowing DCOM traffic to cross the firewall
  4. Tunneling the DCOM traffic through TCP and putting the external OPC Proxy in a DMZ
  5. Using the OPC-UA security model
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset