ICS Attack Targets

ICS Attack Targets

Any hardware or software processing, storing, or transmitting information digitally is vulnerable to cyberattack. Whether the system can be compromised is dependent on whether the vulnerability is exploitable. In other words, any system can be attacked, but not every attack will be successful. In control system environments, several types of digital assets can be targeted by a cyber adversary:

  • Networking devices
  • Programmable logic controllers (PLCs)
  • Remote terminal units (RTUs)
  • Human-machine interface (HMI) workstations
  • Data acquisition servers and historians
  • Engineering workstations
  • Remote access devices
  • Authentication and authorization servers

Even integrated safety systems could be vulnerable, and there is risk if connected directly to the control system network. There are many pathways to communicate with an ICS network and its components using a variety of computing and communications equipment. These pathways can be used by anyone knowledgeable in process equipment, networks, operating systems, and software applications to gain access to the ICS.

Gargar Johnson

Business Development Marketing, And Sales @ Liberia Telecommunications Corporation (LTC) | BIT, Marketing

4y

No system is 100% secure

Like
Reply

To view or add a comment, sign in

Others also viewed

Explore topics