This concludes the ICS computer security discussion. We looked at various ways to improve endpoint security. As with many subjects in this book, we only had time to just scratch the surface of this one as well. The material covered in this chapter should give you a solid foundation to start exploring subjects in more detail by yourself, though. As always, the Internet, with its various search engines, is your best friend.
In the next chapter, we are going to dive into the world of application security, the next layer of the security onion.