80
CYBerseCurItY For InDustrIAL ControL sYsteMs
are coming from, versus information about the assets actually being
targeted. For IT this is mildly actionable given that assets are scat-
tered throughout the infrastructure—basically in every corner of the
IT infrastructure, from laptops and USB sticks to data warehouses.
In this case, penetration of any variety into the corporate environment
is likely to elicit a hit. ICS do not have the same history of ubiqui-
tous access, mobile devices, and heterogeneous user bases behaving in
a wide variety of manners. For this reason, threat-from information
without threat-to information possesses less actionable value for ICS.
Consequently, threat taxonomies that apply to threat agents, means,
motivations, ...