About This Chapter
Industrial Network Security and Threats - Chapter Summary
Many threats can damage industrial networks, causing a range of financial and privacy concerns. In this chapter, you can learn about the impact that cyber attacks can have on industrial networks, typical security measures, and common misunderstandings about network security. Descriptions of specific issues that have occurred will bring this material to life. You'll find that using our platform is a great way to quickly gain the information you need. With short chapters that you can review anywhere and frequent quizzes to test your progress, you can be assured that you're mastering what you need to know. After you have surveyed this chapter, you'll be able to:
- Describe why it's important to secure industrial networks, and why their security may lag behind other systems.
- Detect and prevent advanced system threats
- Understand hacking and cyber crime, and the motives of those involved in these activities
- Explain cyber war and how it differs from other threats
- Discuss the concept of insider threats
- Demonstrate an understanding of hacktivism and common targets
- Define cyber terrorism and how to address it
1. Securing Industrial Networks: Purpose & Importance
In this lesson, we will study the purpose and importance of securing industrial networks. Topics covered include air gaps, zero-day threats and the potential lag of identification and assessment of vulnerabilities in industrial networks.
2. Attacks on Industrial Networks: Impacts & Incident Examples
In this lesson, we will discuss how cyber attacks affect industrial networks. Additionally, we will review real-life incidents where cyber attacks have been launched against industrial networks, disrupting operations.
3. Common Misconceptions About Industrial Network Security: Types & Examples
Network security is an important element of network design to keep your business and data safe. However, people often have misconceptions about network security. This lesson will discuss some of these misconceptions and how it impacts security.
4. Industrial Network Security Recommendations: Common & Advanced Strategies
In this lesson, you will learn the common practices used to secure industrial networks. You will learn the different types of threats that common industrial networks may encounter and also their vulnerabilities.
5. Advanced Persistent Threats: Detection & Protection
What is an advanced persistent threat and do you know of the dangers associated with it? Do you know how to prevent them or even detect them? This lesson can help answer those questions.
6. What is Computer Hacking? - Definition, Prevention & History
In this lesson, we'll learn what computer hacking is, the activities involved, and ways of preventing it. We'll also examine briefly how computer hacking has evolved over the years.
7. Cyber Crime in Business: Assessing Risk & Responding
In this lesson, we'll take a look at cyber crime, what it is, how to assess and reduce the possible risks, and how to respond to cyber crimes if they occur.
8. Cyber War & Advanced Persistent Threats: Differences, Examples & Trends
In this lesson, we will discuss what cyber warfare and advanced persistent threats are, as well as how they differ from one another. Additionally, we will briefly review examples for each as well as what we can expect in the foreseeable future.
9. Insider Threat: Detection & Mitigation
Insider threats are becoming more and more common these days in business. In this lesson, we'll take a look at what they are, how to detect them, and how to mitigate them.
10. Hacktivism: Definition, Examples, Threats & Solutions
Hacking is a threat that every computer, individual and organization faces. Hacktivism is a newer subset of the hacking culture. This lesson discusses what hacktivism is and provides examples to better understand this trend among the hacking culture.
11. Hacking Industrial Systems: Motives, Targets, Methods & Consequences
In this lesson, we will discuss the motives, targets, and methods used in hacking industrial systems. Additionally, we will review some of the consequences faced by both the target and the hacker when a successful cyber attack is launched.
12. Weaponization of Industrial Cyber Threats: Overview & Trends
In this lesson, we will briefly discuss what cyber terrorism is, how cyber threats can be weaponized and used to attack industrial systems, trends in such attacks and steps to counter them.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Computer Science 330: Critical Infrastructure Security course
- Introduction to Industrial Networks & Control Systems
- Industrial Network Design & Architecture
- Network Protocols in Industrial Networks
- Risk Assessment & Vulnerability in Industrial Networks
- Implementing Secure Zones & Conduits in Industrial Networks
- Protecting Industrial Networks Using Security & Access Controls
- Detecting Threats, Exceptions & Anomalies in Critical Infrastructure
- Monitoring the Security of Industrial Networks
- Policies, Procedures & Standards for ICS & SCADA Systems
- Required Assignments for Computer Science 330