O'Reilly logo

Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions by Stephen Hilt, Kyle Wilhoit, Aaron Shbeeb, Bryan Singer, Clint Bodungen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 10

ICS RISK MITIGATION STRATEGIES

As mentioned throughout this book, the value of penetration testing is realized when used in conjunction with threat modeling and as part of an overall risk assessment process to make risk mitigation strategies more efficient and cost-effective. This is effectively the return on investment (ROI) for penetration testing. No organization has unlimited resources, so defensive measures must be prioritized to be most effective and efficient in defense and cost.

image

Many people confuse the terms remediation and mitigation and often use them interchangeably, not knowing the difference. But they are not quite ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required