Effective ICS cyber defense methods

Wingman

Level 4
Thread author
Verified
Well-known
Feb 6, 2017
154
687
268
Galaxy far away...
Internally generated cyber-attacks start with inserting the malware into one of the ICS computers or field controllers and that malware will propagate towards the targeted device. Externally generated cyber-attack is compromising the IT defense layer and consequently the firewall between the IT and ICS segments.
 

You may also like...