10: OT Attack and Defense Lifecycles

Abstract

Malware has been around since the dawn of personal computing: the first virus being the Creeper virus in 1971, a proof-of-concept virus that spread through ARPANET-connected computers,1 and the first personal computer being attributed to the Kenbak-1 computer2 also in 1971. However, malware has advanced significantly since then, and cyberattacks very rarely depend on a single piece of malware. Instead they have evolved into campaigns that consist of multiple steps. Instead of singular actions that result in a single outcome, attack campaigns coordinate multiple actions to produce a more sophisticated outcome. The sophistication of both attack and defense techniques have grown to a degree where ...

Get Industrial Network Security, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.