10.08.2015 Views

Process Control Network Security

Process Control Network Security - Vurore

Process Control Network Security - Vurore

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

1.2 Reading guideChapter 2 will present the reasons for research, the goal, the research questionsand research approach. In addition, the CIA triad and STRIDE will be brieflydiscussed.Chapter 3 will introduce the reader into the “Industrial IT” environment, includingfrequently used terminology, components and recent changes in communicationtopology.Chapter 4 will present the main differences between the “Office IT” and“Industrial IT” environments.Chapter 5 will focus on the risks involved in “Industrial” IT environments. Theserisks are important because mitigating controls should be in place to limit theserisks.Chapter 6 will focus on the legislation, good practices and control frameworksthat already exist.Chapter 7 will present the risks specific to “Industrial IT” environments and byalso using other frameworks will conclude in one specific framework to addressthe risks specific to “Industrial IT” environments.Chapter 8 will discuss our conclusions (i.e. answers to the research questions)and will provide recommendations and suggestions for future research.<strong>Process</strong> <strong>Control</strong> <strong>Network</strong> <strong>Security</strong> Page 6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!