Ch 2: Industrial Network Security & Threats

About This Chapter

You can use this chapter on industrial network security threats to learn more about specific security concerns and how to address them, such as hacking, cyber war, and cyber terrorism. The lessons and quizzes are a convenient way to prepare for an upcoming test or get ahead in class.

Industrial Network Security and Threats - Chapter Summary

Many threats can damage industrial networks, causing a range of financial and privacy concerns. In this chapter, you can learn about the impact that cyber attacks can have on industrial networks, typical security measures, and common misunderstandings about network security. Descriptions of specific issues that have occurred will bring this material to life. You'll find that using our platform is a great way to quickly gain the information you need. With short chapters that you can review anywhere and frequent quizzes to test your progress, you can be assured that you're mastering what you need to know. After you have surveyed this chapter, you'll be able to:

  • Describe why it's important to secure industrial networks, and why their security may lag behind other systems.
  • Detect and prevent advanced system threats
  • Understand hacking and cyber crime, and the motives of those involved in these activities
  • Explain cyber war and how it differs from other threats
  • Discuss the concept of insider threats
  • Demonstrate an understanding of hacktivism and common targets
  • Define cyber terrorism and how to address it

12 Lessons in Chapter 2: Industrial Network Security & Threats
Test your knowledge with a 30-question chapter practice test
Securing Industrial Networks: Purpose & Importance

1. Securing Industrial Networks: Purpose & Importance

In this lesson, we will study the purpose and importance of securing industrial networks. Topics covered include air gaps, zero-day threats and the potential lag of identification and assessment of vulnerabilities in industrial networks.

Attacks on Industrial Networks: Impacts & Incident Examples

2. Attacks on Industrial Networks: Impacts & Incident Examples

In this lesson, we will discuss how cyber attacks affect industrial networks. Additionally, we will review real-life incidents where cyber attacks have been launched against industrial networks, disrupting operations.

Common Misconceptions About Industrial Network Security: Types & Examples

3. Common Misconceptions About Industrial Network Security: Types & Examples

Network security is an important element of network design to keep your business and data safe. However, people often have misconceptions about network security. This lesson will discuss some of these misconceptions and how it impacts security.

Industrial Network Security Recommendations: Common & Advanced Strategies

4. Industrial Network Security Recommendations: Common & Advanced Strategies

In this lesson, you will learn the common practices used to secure industrial networks. You will learn the different types of threats that common industrial networks may encounter and also their vulnerabilities.

Advanced Persistent Threats: Detection & Protection

5. Advanced Persistent Threats: Detection & Protection

What is an advanced persistent threat and do you know of the dangers associated with it? Do you know how to prevent them or even detect them? This lesson can help answer those questions.

What is Computer Hacking? - Definition, Prevention & History

6. What is Computer Hacking? - Definition, Prevention & History

In this lesson, we'll learn what computer hacking is, the activities involved, and ways of preventing it. We'll also examine briefly how computer hacking has evolved over the years.

Cyber Crime in Business: Assessing Risk & Responding

7. Cyber Crime in Business: Assessing Risk & Responding

In this lesson, we'll take a look at cyber crime, what it is, how to assess and reduce the possible risks, and how to respond to cyber crimes if they occur.

Cyber War & Advanced Persistent Threats: Differences, Examples & Trends

8. Cyber War & Advanced Persistent Threats: Differences, Examples & Trends

In this lesson, we will discuss what cyber warfare and advanced persistent threats are, as well as how they differ from one another. Additionally, we will briefly review examples for each as well as what we can expect in the foreseeable future.

Insider Threat: Detection & Mitigation

9. Insider Threat: Detection & Mitigation

Insider threats are becoming more and more common these days in business. In this lesson, we'll take a look at what they are, how to detect them, and how to mitigate them.

Hacktivism: Definition, Examples, Threats & Solutions

10. Hacktivism: Definition, Examples, Threats & Solutions

Hacking is a threat that every computer, individual and organization faces. Hacktivism is a newer subset of the hacking culture. This lesson discusses what hacktivism is and provides examples to better understand this trend among the hacking culture.

Hacking Industrial Systems: Motives, Targets, Methods & Consequences

11. Hacking Industrial Systems: Motives, Targets, Methods & Consequences

In this lesson, we will discuss the motives, targets, and methods used in hacking industrial systems. Additionally, we will review some of the consequences faced by both the target and the hacker when a successful cyber attack is launched.

Weaponization of Industrial Cyber Threats: Overview & Trends

12. Weaponization of Industrial Cyber Threats: Overview & Trends

In this lesson, we will briefly discuss what cyber terrorism is, how cyber threats can be weaponized and used to attack industrial systems, trends in such attacks and steps to counter them.

Chapter Practice Exam
Test your knowledge of this chapter with a 30 question practice chapter exam.
Not Taken
Practice Final Exam
Test your knowledge of the entire course with a 50 question practice final exam.
Not Taken

Earning College Credit

Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.

To learn more, visit our Earning Credit Page

Transferring credit to the school of your choice

Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.

Support