Process Control Network Security
Process Control Network Security - Vurore
Process Control Network Security - Vurore
- No tags were found...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
1.2 Reading guideChapter 2 will present the reasons for research, the goal, the research questionsand research approach. In addition, the CIA triad and STRIDE will be brieflydiscussed.Chapter 3 will introduce the reader into the “Industrial IT” environment, includingfrequently used terminology, components and recent changes in communicationtopology.Chapter 4 will present the main differences between the “Office IT” and“Industrial IT” environments.Chapter 5 will focus on the risks involved in “Industrial” IT environments. Theserisks are important because mitigating controls should be in place to limit theserisks.Chapter 6 will focus on the legislation, good practices and control frameworksthat already exist.Chapter 7 will present the risks specific to “Industrial IT” environments and byalso using other frameworks will conclude in one specific framework to addressthe risks specific to “Industrial IT” environments.Chapter 8 will discuss our conclusions (i.e. answers to the research questions)and will provide recommendations and suggestions for future research.<strong>Process</strong> <strong>Control</strong> <strong>Network</strong> <strong>Security</strong> Page 6