About This Chapter
Detecting Threats, Exceptions, and Anomalies in Critical Infrastructure - Chapter Summary
An important component to work in the computer science field is dealing with threats to the privacy of information on a network. In these lessons, we provide a detailed examination of threats to information security, and methodologies that can be used to detect and handle such threats. You will learn about behavioral whitelisting, unified threat management, and more! Study.com offers short lessons - usually under ten minutes - so you can master this material during any short time chunks of time in your day, including your morning commute. Worksheets and quizzes after many lessons ensure that you're making progress on learning the material. After you work through this chapter, you should be able to:
- Consider what information security threats are, and why they are important
- Describe both systematic and manual methods for the reporting of exceptions
- Explain how anomalies are detected, and what tools are used in such detection
- Tell how the behavioral whitelisting technique is used in industrial networks
- Discuss methods of threat detection, and how threats are handled when they are detected
- Recognize how to secure information, and appliances used to implement unified threat management
1. Definition of Threat in Information Security
Information security is a major topic in the news these days. After all, information plays a role in almost everything we do. In this lesson, we'll take a look at what it is, threats, and why they are important.
2. Exception Reporting in Industrial Networks: Importance & Examples
In this lesson, we will learn about exception reporting and its importance in industrial networks. We will briefly study automatic and manual exceptions and also see a few examples of exception reporting.
3. Detecting Behavioral Anomalies in Industrial Networks: Definition, Tools & Examples
In this lesson, we will define what a behavioral anomaly is and subsequently what network behavior anomaly detection (NBAD) is. We will then discuss how detection is performed within an industrial network and what tools can be used.
4. Behavioral Whitelisting: Definition, Examples & Uses in Industrial Networks
In this lesson, we will learn about what behavioral whitelisting is and when it is used. We will also see some examples of how behavioral whitelisting is used in industrial networks.
5. Threat Detection in Industrial Networks: Methods & Examples
Modern industrial control systems are beginning to connect to internet technology and networks. Given this shift, ICS networks are an appealing target for cyber criminals. This lesson will discuss ICS vulnerabiliteis and methods of detection and control to protect ICS systems.
6. Unified Threat Management (UTM) Appliance Comparison
Securing information and protecting it against possible problems is of prime importance. In this lesson, we'll take a look at the threat, what it is, unified threat management, and some of the appliances that are used to implement it.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Computer Science 330: Critical Infrastructure Security course
- Introduction to Industrial Networks & Control Systems
- Industrial Network Security & Threats
- Industrial Network Design & Architecture
- Network Protocols in Industrial Networks
- Risk Assessment & Vulnerability in Industrial Networks
- Implementing Secure Zones & Conduits in Industrial Networks
- Protecting Industrial Networks Using Security & Access Controls
- Monitoring the Security of Industrial Networks
- Policies, Procedures & Standards for ICS & SCADA Systems
- Required Assignments for Computer Science 330