Chapter 15: Industrial Control System Risk Assessments
In this chapter, we are going to get into the details of Industrial Control System (ICS) risk assessments. We will start the chapter off with a short discussion of how objectives and approaches differ between Information Technology (IT) and ICS cyber attacks. After that, we will explore the different approaches and techniques behind IT system risk assessments before we look at the added complexity of conducting ICS-specific assessments. At the end of this chapter, you should have a good understanding of what is involved in conducting ICS-specific risk assessments.
We will cover the following topics in this chapter:
- Understanding the attack stages and ultimate objectives of ICS cyber attacks
- Risk assessments
- Asset identification
- System characterization
- Vulnerability identification
- Threat modeling
- Risk calculation
- Risk mitigation prioritization
The entire chapter can be found at GitHub...