O'Reilly logo

Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions by Stephen Hilt, Kyle Wilhoit, Aaron Shbeeb, Bryan Singer, Clint Bodungen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 2

ICS RISK ASSESSMENT

One of the primary use cases for a penetration test, specifically in the context of ICS, is as part of an overall risk assessment process. Multiple tasks from the risk assessment all work in concert to provide the data needed for the final risk calculations, which ultimately help define your risk mitigation strategy. Determining the “likelihood” of a successful attack or incident is a defining characteristic and major component of the final risk calculations. It is also crucial to your risk mitigation strategy if you want your results to be efficient and cost effective by targeting the most immediate and impactful threats first. This determination is especially important if you have limited resources (budget ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required