Because of the unique communications of cyber-physical systems, new tools have been developed in order to effectively monitor and defend these systems. Two specific efforts and approaches to these design and security challenges are the DoD Industrial Control System Defense Operational Approach, which focuses on detection, mitigation, and recovery and the Cyber Threat Activity Matrix (CTAM) Cyber Threat Database Resources and CyberStorm, which includes advanced IDS designed to optimize ICS network defense.
Cyber Awareness Videos - Emerging Concepts to Critical Infrastructure
Please see our terms of use located here: https://www.csiac.org/csiac-terms-of-use/
Leave a Comment
You must be logged in to post a comment.