O'Reilly logo

Hacking Exposed Industrial Control Systems: ICS and SCADA Security Secrets & Solutions by Stephen Hilt, Kyle Wilhoit, Aaron Shbeeb, Bryan Singer, Clint Bodungen

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

PART I

SETTING THE STAGE: PUTTING ICS PENETRATION TESTING IN CONTEXT

CASE STUDY, PART 1: Recipe for Disaster

Wednesday, 9:45 AM

Bob sat down at the display terminal with his second morning cup of coffee and continued to scan over the Human-Machine Interface (HMI). On the desk in front of him were three 23-inch monitors, connected and placed side by side. He scoffed, annoyed at the login prompt.

“IT security...,” he thought sarcastically.

He remembered when things were much simpler—and much more convenient. He used to be able to walk away from his terminal, go out for a smoke, get a fresh cup of coffee, and when he returned, there were his displays waiting for him, just the way he left them. Now he had to come back to an annoying password ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required