Virtual CISO
Jun8

Infrastructure Security

Critical infrastructures have naturally come to utilise Information Technology as a key component that connects them across multiple levels as this capability has become more and more available. As a result, infrastructure systems have become highly interconnected, and interdependent. Intrusions and disruptions in one infrastructure might provoke unexpected failures in others, which makes handling interdependencies a key concern. To ensure Infrastructure Security, it is critical to be aware of all assets within the infrastructure and the vulnerabilities inherent within the said assets. Infrastructure components would cover a wide range of OS, applications and protocols including but not limited to:

  • Windows
  • Linux
  • Networking devices
  • Mobile devices
  • Databases
  • Web Applications
  • SCADA Devices
  • Out of the box applications such as Microsoft Office applications, Adobe, etc.

More Blogs