Summary
In this chapter, we have taken a look at the challenges when supporting operational technologies. We have looked at examples of ICS where plant and equipment must be controlled using SCADA networks. We have studied the importance of adhering to legal and regulatory responsibilities. We have discussed that countries have different laws and regulatory requirements. We have seen examples of some significant fines that can be levied when it is proven that a company has broken laws or safety protocols. We have looked at the technology used to deliver automation and supervisory control and have taken a look at popular protocols used on these networks. We have looked at examples of embedded systems and the challenges that they may bring when networking these devices.
The skills learned in this chapter will be useful as we move on to the next chapter, where we will take a look in more depth at securing data using cryptography and PKI.