From the course: Ethical Hacking: Hacking IoT Devices
Unlock the full course today
Join today to access over 24,400 courses taught by industry experts.
Targeting OT systems
From the course: Ethical Hacking: Hacking IoT Devices
Targeting OT systems
- [Instructor] Malicious actors use a variety of different methods to compromise the security of an industrial control system. In this segment, we'll review various methods used to control or disrupt operations in a critical infrastructure environment. Industrial control systems are typically used in sectors such as manufacturing, energy, transportation, and utilities. Auditing these systems is crucial for ensuring their reliability, safety, and protection against cybersecurity threats. During this process, the team will examine and evaluate the security, performance, and compliance of the technology and processes used in industrial and critical infrastructure settings. The initial phase of an attack typically involves a reconnaissance exercise to learn more about the target environment and what is the best approach to launch an attack. As illustrated here in this simplified graphic of an industrial control system, there are many attack vectors and ways to gain access to the system…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.