Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

Home > CyberX > CyberX Presents: ICS Hacking Exposed

CyberX Presents: ICS Hacking Exposed

White Paper Published By: CyberX
Published:  Feb 03, 2017
Type:  White Paper
Length:  65 pages

Many organizations are now implementing modernization initiatives such as Smart Manufacturing and Smart Grids, resulting in increased connectivity between IT and OT (Operational Technology) networks.

But this increased connectivity also leads to increased ICS/SCADA cyber-risk — as cyberattackers seek to disrupt production operations, deploy ransomware, and steal corporate IP using industrial malware and targeted threats. To help you get up to speed on ICS risk management, we’re pleased to offer these complementary educational chapters from Hacking Exposed: Industrial Control Systems.

By exploring cybersecurity from an attacker’s perspective, this new book follows in the same spirit as the wildlypopular Hacking Exposed series. In this hands-on guide, the authors leverage their experience as ICS/SCADA security experts to show you how to implement an ICS-focused risk mitigation framework that’s practical and efficient. The two complementary chapters include:

  1. Introduction to ICS Security, where you’ll learn what’s driving IT/OT convergence; how IT and OT cybersecurity are different; understanding realistic ICS threats; and common terminology used in ICS environments (PLC, HMI, etc.).
  2. ICS Risk Assessment, where the authors describe standard ICS risk assessment frameworks; how to define business objectives, threat targets, impacts and risk scores; and identifying assets, network topology, and vulnerabilities without impacting production systems.

Tags : 
cyberx, ics hacking, hacking, cyberweapons, cyberattacks, production operations, ics, scada