From the course: Ethical Hacking: Hacking IoT Devices

Unlock the full course today

Join today to access over 24,400 courses taught by industry experts.

Targeting OT systems

Targeting OT systems

- [Instructor] Malicious actors use a variety of different methods to compromise the security of an industrial control system. In this segment, we'll review various methods used to control or disrupt operations in a critical infrastructure environment. Industrial control systems are typically used in sectors such as manufacturing, energy, transportation, and utilities. Auditing these systems is crucial for ensuring their reliability, safety, and protection against cybersecurity threats. During this process, the team will examine and evaluate the security, performance, and compliance of the technology and processes used in industrial and critical infrastructure settings. The initial phase of an attack typically involves a reconnaissance exercise to learn more about the target environment and what is the best approach to launch an attack. As illustrated here in this simplified graphic of an industrial control system, there are many attack vectors and ways to gain access to the system…

Contents