ICS security design and architecture
Due to the immense size and complexity of ICS, which encompasses multiple components in distinct geographic areas running multiple processes simultaneously, systems are often split into multiple operational zones. Each area requires distinctive technical specifications, resulting in numerous distinct models being built for effective management. These legacy systems were not initially created with security in mind; as such, they are markedly susceptible to cyber threats if proper security strategies are not put in place.
The implementation of a DiD strategy and the incorporation of the Purdue model could greatly contribute to a secure architectural design.
The Purdue model
The Purdue model was first introduced as a guide to illustrate the movement of data in Computer-Integrated Manufacturing (CIM), an advanced system for fabrication where computers take control of the whole manufacturing process. It later developed into an open standard...