This ISA technical report provides a current assessment of various cyber security tools, mitigation counter-measures, and technologies that may effectively apply to the modern electronically based IACSs regulating and monitoring numerous industries and critical infrastructures. It describes several categories of control system-centric cyber security technologies; the types of products available in those categories; the pros and cons of using those products in the automated IACS environments relative to the expected threats and known cyber vulnerabilities; and, most important, the preliminary recommendations and guidance for using these cyber security technology products and/or countermeasures.
Product Details
Published: 10/29/2007 ISBN(s): 9781934394427 ANSI: ANSI Approved Number of Pages: 102