Cyberattacks on ICSs
With the development of digitization, digital transformation, and upgrading of ICSs, more and more components in IT technologies are introduced into the ICS. Similar to the increasingly serious risks to security and privacy in the IT infrastructure such as ransomware, key data leakage, and anomaly access control, these issues are also copied into the ICS field.
We will divide our content into two parts:
- Cyberattacks on the entire ICS
- Primarily concentrate on the sub-components in the ICS, targeting the specific components, such as controller, wireless/cellular network, and ICS configuration systems
Cyberattacks on the ICS
Although there are many types of attacks targeting ICSs, some of them aim at the broader ICS network or system as a whole, potentially impacting multiple components and processes simultaneously. A few of them are listed here:
- Ransomware attacks: While these can target specific devices, their impact is often system...