atrc_website:control_systems_security
Differences
This shows you the differences between two versions of the page.
| atrc_website:control_systems_security [2022/07/20 16:45] – created wikiadmin | atrc_website:control_systems_security [2022/07/20 16:45] (current) – wikiadmin | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| + | ====== Assessing and Exploiting Control Systems Architectures ====== | ||
| + | |||
| + | |||
| + | |||
| + | Examples when to use | ||
| + | |||
| + | Overview of methodology | ||
| + | |||
| + | Different security assessment types and their respective benefits and risks | ||
| + | |||
| + | * Passive vs active assessments | ||
| + | * Manual vs automated | ||
| + | * Reasons why architecture reviews should always be performed first | ||
| + | |||
| + | Basic control system concepts, systems, and devices | ||
| + | |||
| + | * Control system architectures | ||
| + | * PLCs, RTUs, and IEDs | ||
| + | * Understanding RTOS | ||
| + | * Industrial and non-Industrial | ||
| + | * What is IIoT and how it differs from IoT | ||
| + | * Field devices, buses, and loops | ||
| + | |||
| + | DCS vs SCADA | ||
| + | |||
| + | * Plant neworks | ||
| + | * SCADA networks | ||
| + | * Purdue model and IEC 62443 | ||
| + | |||
| + | |||