Insecure by Inheritance

After last chapter's high-level explanation of what an Industrial control system (ICS) is, what it does, and what it is made of, let's start with a deep dive into a select set of technologies that can be found in most Industrial controls systems and examine some of the vulnerabilities or weaknesses that these technologies have.

In this chapter, we will cover the following topics:

  • The Industrial control system history.
  • The Industrial communication protocols with particular attention to:
    • PROFINET
    • EtherNet/IP
    • Common Industrial protocol
    • Ethernet
    • Modbus TCP/IP
  • Common IT protocols found in the ICS

Get Industrial Cybersecurity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.