A security audit has revealed that a process control terminal is vulnerable to malicious users installing and executing software on the system. The terminal is beyond end-of-life support and cannot be upgraded, so it is placed on a protected network segment. Which of the following would be MOST effective to implement to further mitigate the reported vulnerability?
sujon_london
Highly Voted 1 year, 10 months agoadamer91
Most Recent 1 year, 4 months agologinnow123
1 year, 6 months ago