Physical ICS Security

In this chapter, we will take a closer look at what physical security entails in the context of an ICS. We will look at the ICS security bubble analogy that I like to use during security engagements, to help visualize and explain the methodology behind securing legacy devices and systems that cannot be defended by regular means because of device restrictions or uptime requirements.

In this chapter we will discuss the following topics:

  • The ICS security bubble analogy 
  • Segregation exercise 
  • Physical ICS security
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.190.176.243