O'Reilly logo

Protecting Industrial Control Systems from Electronic Threats by Joseph Weiss

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

ICS Cyber Incident Response

  • If a cyber incident occurs, continue to operate the facility in an efficient, safe, and secure manner until told otherwise. In a cyber incident, odd things may happen and nobody knows why. It could be anything—a “system glitch,” disgruntled employees or contractors, a software bug, a hardware problem, and so on. Logging may not be sufficient to unambiguously identify the incident as a cyber incident. There have been several cyber incidents where it was not recognized as a cyber incident for hours and even days. The “glitch” may go away when you reboot, but that does not mean it was not a cyber incident or a Trojan was not left behind. Perform a comprehensive root-cause evaluation with both Operations and IT. Find ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required