Copyright

Ch 8: Detecting Threats, Exceptions & Anomalies in Critical Infrastructure

About This Chapter

These lessons about threats to network security will help you to thoroughly learn important topics related to threats to the security of information. Prepare for a career in the information security, think about how industry keeps information safe, or just boost your knowledge in a range of computer science topics.

Detecting Threats, Exceptions, and Anomalies in Critical Infrastructure - Chapter Summary

An important component to work in the computer science field is dealing with threats to the privacy of information on a network. In these lessons, we provide a detailed examination of threats to information security, and methodologies that can be used to detect and handle such threats. You will learn about behavioral whitelisting, unified threat management, and more! Study.com offers short lessons - usually under ten minutes - so you can master this material during any short time chunks of time in your day, including your morning commute. Worksheets and quizzes after many lessons ensure that you're making progress on learning the material. After you work through this chapter, you should be able to:

  • Consider what information security threats are, and why they are important
  • Describe both systematic and manual methods for the reporting of exceptions
  • Explain how anomalies are detected, and what tools are used in such detection
  • Tell how the behavioral whitelisting technique is used in industrial networks
  • Discuss methods of threat detection, and how threats are handled when they are detected
  • Recognize how to secure information, and appliances used to implement unified threat management

6 Lessons in Chapter 8: Detecting Threats, Exceptions & Anomalies in Critical Infrastructure
Test your knowledge with a 30-question chapter practice test
Definition of Threat in Information Security

1. Definition of Threat in Information Security

Information security is a major topic in the news these days. After all, information plays a role in almost everything we do. In this lesson, we'll take a look at what it is, threats, and why they are important.

Exception Reporting in Industrial Networks: Importance & Examples

2. Exception Reporting in Industrial Networks: Importance & Examples

In this lesson, we will learn about exception reporting and its importance in industrial networks. We will briefly study automatic and manual exceptions and also see a few examples of exception reporting.

Detecting Behavioral Anomalies in Industrial Networks: Definition, Tools & Examples

3. Detecting Behavioral Anomalies in Industrial Networks: Definition, Tools & Examples

In this lesson, we will define what a behavioral anomaly is and subsequently what network behavior anomaly detection (NBAD) is. We will then discuss how detection is performed within an industrial network and what tools can be used.

Behavioral Whitelisting: Definition, Examples & Uses in Industrial Networks

4. Behavioral Whitelisting: Definition, Examples & Uses in Industrial Networks

In this lesson, we will learn about what behavioral whitelisting is and when it is used. We will also see some examples of how behavioral whitelisting is used in industrial networks.

Threat Detection in Industrial Networks: Methods & Examples

5. Threat Detection in Industrial Networks: Methods & Examples

Modern industrial control systems are beginning to connect to internet technology and networks. Given this shift, ICS networks are an appealing target for cyber criminals. This lesson will discuss ICS vulnerabiliteis and methods of detection and control to protect ICS systems.

Unified Threat Management (UTM) Appliance Comparison

6. Unified Threat Management (UTM) Appliance Comparison

Securing information and protecting it against possible problems is of prime importance. In this lesson, we'll take a look at the threat, what it is, unified threat management, and some of the appliances that are used to implement it.

Chapter Practice Exam
Test your knowledge of this chapter with a 30 question practice chapter exam.
Not Taken
Practice Final Exam
Test your knowledge of the entire course with a 50 question practice final exam.
Not Taken

Earning College Credit

Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Support