Summary
In this chapter, we addressed the need to properly secure an ICS by providing an overview of DiD layers, security design, and architecture, examining ICS components, and providing insight into real-life examples of SIS reference architectures (including Honeywell, Yokogawa, Emerson, ABB, Siemens, and Rockwell) and exploring the different safety network protocols that are available for secure communications.
The next chapter will focus on identifying attack vectors and entry points for attacking SISs, as well as techniques for thwarting such malicious activities.