atrc_website:control_systems_security
Differences
This shows you the differences between two versions of the page.
atrc_website:control_systems_security [2022/07/20 16:45] – created wikiadmin | atrc_website:control_systems_security [2022/07/20 16:45] (current) – wikiadmin | ||
---|---|---|---|
Line 1: | Line 1: | ||
+ | ====== Assessing and Exploiting Control Systems Architectures ====== | ||
+ | |||
+ | |||
+ | |||
+ | Examples when to use | ||
+ | |||
+ | Overview of methodology | ||
+ | |||
+ | Different security assessment types and their respective benefits and risks | ||
+ | |||
+ | * Passive vs active assessments | ||
+ | * Manual vs automated | ||
+ | * Reasons why architecture reviews should always be performed first | ||
+ | |||
+ | Basic control system concepts, systems, and devices | ||
+ | |||
+ | * Control system architectures | ||
+ | * PLCs, RTUs, and IEDs | ||
+ | * Understanding RTOS | ||
+ | * Industrial and non-Industrial | ||
+ | * What is IIoT and how it differs from IoT | ||
+ | * Field devices, buses, and loops | ||
+ | |||
+ | DCS vs SCADA | ||
+ | |||
+ | * Plant neworks | ||
+ | * SCADA networks | ||
+ | * Purdue model and IEC 62443 | ||
+ | |||
+ | |||