Summary
In this chapter, we examined commonly used attack techniques in the field of SISs, highlighting various aspects and evidence associated with previous attacks and incidents. These findings serve as valuable resources for implementing effective countermeasures and conducting further security research in this domain.
The next chapter will dive into security measures that can be implemented to safeguard ICSs and SISs from malicious entities, emphasizing the importance of people, processes, and technology in mitigating deliberate or accidental threats.