Discovering vulnerabilities

The first activity in this step is discovering all the vulnerabilities that are lurking in the system under consideration. There are two main methods in accomplishing this task: by comparison and by scanning. The comparison method takes all the running software, firmware, and OS versions and compares them to online vulnerability databases, searching for known vulnerabilities. Some online resources to find vulnerabilities include the following:

It must be said that this method is very labor-intensive but has little to no risk to the ICS network as no network packets need to ...

Get Industrial Cybersecurity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.