
94 Handbook of SCADA/Control Systems Security
sanitized through various methods, after which it will require courage on the part of
senior management to release it. All recipients must be trusted to use the threat infor-
mation responsibly, to share it with trusted colleagues, and to protect it appropriately
throughout its lifecycle. In this manner, the most accurate and current threat picture
will be possible, which will in turn improve the quality and utility of the subsequent
risk assessment.
VULNERABILITIES
A vulnerability, as put forward in the MIPIS program and other credible institutions
that have a strong risk management approach, is descr ...