Resilience How much resilience is sufficient: single, dual, triple, quadruple or more? You need to understand what is the consequence of Perimeter The key difference between physical and cyber perimeters is visibility. To augment physical perimeter limitations, surveillance cameras (probably with video Boundary Typically, the boundary defines a clear demarcation of accountability in the case of ICT or ICS system landscape. It also Mistaken Identity This is to attack trust based on some one you know. In physical world, this is harder as you will Access Control In physical world, access control is done by certain barrier that this barrier will be disabled for entry by authenticated Design & Build Secure by design of ICS (Industrial Control System) is just part of the ICS life cycle. If design is insecure, FUD Fear, Uncertainty, Doubt (FUD) is the tactic vendors are trying to sell you their cybersecurity solution. Typically, this is done Operation Risk Unlike IT application, ICS (Industrial Control System) involves direct physical process that will affect human safety and impose environment impacts. Black List, White List, Sandbox Malware is the key attack act in the cyber space. Black list is used in anti-malware protection, anti-spam or web Policies #2 Setting up policies seems easy, it's just putting down the management objective in written form. However, the objective must be Grade of Protection When we deploy protection, normally it might be of civilian grade even it appears harder to break in. If attack 360 In physical world, 360 degree can further be 2D or 3D. Anyway, it has the sense for a holistic view « Previous 1 … 15 16 17 18 19 … 22 Next »