August 10, 2021 by Admin
A hospital is using a functional magnetic resonance imaging (fMRI) scanner, which is controlled by a legacy desktop connected to the network. The manufacturer of the fMRI will not support patching of the legacy system. The legacy desktop needs to be network accessible on TCP port 445. A security administrator is concerned the legacy system will be vulnerable to exploits. Which of the following would be the BEST strategy to reduce the risk of an outage while still providing for security?
- Install HIDS and disable unused services
- Enable application whitelisting and disable SMB
- Segment the network and configure a controlled interface
- Apply only critical security patches for known vulnerabilities