CHAPTER 1

INTRODUCTION TO INDUSTRIAL CONTROL SYSTEMS [IN]SECURITY

It’s 3:30 AM: bathed in the pale glow of a computer monitor and the flickering green lights of the nearest network switch, the hacker sits at a keyboard, researching his next victim. The soft clicks of deft hands on a keyboard and the cooling fans of overloaded computer equipment are the only sounds, a false representation of the destruction that awaits. We join our plucky anti-hero in the middle of an around-the-world, multiday, caffeine-fueled hacking bender. Several major oil and gas facilities lay in his digital trail of destruction.

A few taps into his favorite search engine, and he finds his next target: an oil drilling rig in the Gulf of Mexico. Two Nmap scans later, ...

Get Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.