Chapter 6. Vulnerability and Risk Assessment

Information in this Chapter:

• Basic Hacking Techniques
• Accessing Industrial Networks
• Determining Vulnerabilities
• Vulnerability Management
In order to protect an industrial network from attack, it is important to understand how an attacker might approach an industrial network, gain access, and ultimately gain control. The basic hacking methodology and techniques of “identify, enumerate, and penetrate” are often discussed within the context of a typical Ethernet and Transmission Control Protocol/Internet Protocol (TCP/IP) enterprise network. However, in industrial networks, the methodology holds true but the techniques are subtly different. The entry points and attack vectors into an industrial system, ...

Get Industrial Network Security now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.