O'Reilly logo

Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions by Stephen Hilt, Kyle Wilhoit, Aaron Shbeeb, Bryan Singer, Clint Bodungen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 6

HACKING ICS DEVICES AND APPLICATIONS

Industrial control systems are large, complex systems of interconnected devices like HMIs, PLCs, sensors, actuators, and other devices that communicate with each other using agreed-upon protocols. The driver behind all of this interaction is software (no pun intended). Software is what can change a PLC from an oil well pump controller to a water purification controller to an expensive paperweight. Software is behind almost every part of ICS. This pervasive presence is evidenced by the portion of all ICS security bugs attributable to software.

In May 2011, the Department of Homeland Security (DHS) published a report titled Common Cybersecurity Vulnerabilities in Industrial Control Systems (https://ics-cert.us-cert.gov/sites/default/files/recommended_practices/DHS_Common_Cybersecurity_Vulnerabilities_ICS_2010.pdf ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required