November 2018
Intermediate to advanced
556 pages
14h 42m
English
Even if the concepts behind DiD are not new, they have only been applied to the ICS environment recently. In the past, most organizations did not recognize the need to do it. Legacy ICS was largely considered hack-proof because of its separation from IT and because many people had physical protection measures in place. However, the convergence of IT and ICS architectures, and the ever-increasing need to use the data and information produced on the factory floor, has highlighted the potential risk to which the control systems are now exposed.
DiD is not just one thing, but a combination of people, technology, operations, and, last but not least, adversarial awareness. The best technology ...