A risk assessment example

We are going to take the assessment approach, explained in the previous section and explore some details by applying it step by step to a fictive system under consideration. Let's imagine that the Slumbertown Mill from the previous chapter decided to hire a security consultant to help them assess and address risk to their ICS network. After outlining contractual details such as scope, timelines and deliverables, a security consultant will typically plan a site visit to start gathering information needed to complete the assessment.

Get Industrial Cybersecurity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.