Understanding the complexities of industrial control system (ICS) security is difficult at best. This app introduces a model to facilitate discussions about cyber security at all levels of expertise, from starter to expert. Named “House of ICS Security,” the app helps users map threats specific to their operations, and counter those threats with appropriate security actions.
The House of ICS Cyber Security app was designed to provide an easy-to-use way to segmenting and categorize industrial security topics and threats. The distinct structure of the house is derived from the fact that security topics can be described using three distinct parameters:
Threat Source (Internal/External), Threat Scenario (Malicious & Criminal Intent/Unintended misuse) and Threat Response (Prevent/Detect/Remediate).
· Discover how the House of ICS Security breaks down cyber security complexities to nurture and facilitate security discussions
· Navigate through different rooms to learn more about security features and best practices
· Discover how to map and counter security threats specific to your operation
· Understand how the House of ICS Security connects users to related areas such as secure development and supply chain security
DISCLAIMER: The House of ICS Security is intended for informational purposes only. Belden assumes no liability whatsoever in connection with the use of the House of ICS Security content.