75
threAts to ICs
enterprise network can be brought down through the resulting denial
of services, which may not even be an intentional act by the bot herd-
ers! is is the sort of collateral damage to a network that can pose
extreme threats to ICS, even if they happen to be logically segmented
but sharing some network elements such as routers, switches, DHCP,
directory, or DNS services. Similarly, any ICS devices that happen to
be sensitive to scans and probes (fragile) may nd themselves facing
a sustained ood of these activities, as multiple internal devices are
compromised and repeat the same pattern.
e process illustrated in this series of diagrams applies pretty
much across the range of hi-jacking malware, even though the exam-
ple use ...