About This Chapter
Risk Assessment and Vulnerability in Industrial Networks - Chapter Summary
The ability to assess and control risks within an industrial network is of major importance to those working with large-scale computer systems. The lessons within this chapter help students to understand common network vulnerabilities, how networks can be protected against attacks, and differences between risk management and risk controls. Our learning platform makes studying these topics fun and easy! The engaging, lessons are taught by experienced instructors and prepare you for important job functions or for material in computer science classes. After you've studied this chapter's material, you'll be able to:
- Assess different ways networks can be attacked and how to prevent those attacks
- Understand why risk management is important to business, particularly in an IT setting
- Utilize a 5-step risk management process
- Recognize four categories of risk controls
- Explain a vulnerability assessment
- Discuss vulnerability management, including patch management and device quarantine
- Classify types of risk
1. How an Industrial Network can be Attacked: Vulnerabilities & Prevention
In this lesson, we'll review some of the vulnerabilities that can be found in industrial networks and how they can be remedied to prevent cyber attacks. We'll also discuss the impact of successful exploitation of these vulnerabilities on industrial processes and society.
2. Risk Control vs. Risk Management
In this lesson, we'll clarify the difference between risk management and risk control. We'll also describe a five step process commonly used in risk management, and then highlight four basic categories of risk controls.
3. Risk Analysis & Risk Management in Business: Overview, Objectives & Comparison
A successful business requires careful attention to the allocation of resources and, just as important, to the degree to which those resources are exposed to risk. In this lesson, we'll discuss the importance of risk analysis and management in business.
4. Risk Management for Information Technology
In this lesson, we'll learn about risk management in an IT setting and how to develop and enact responses to risks in the workplace. Take a short quiz afterward to test your knowledge.
5. Vulnerability Assessments in Industrial Networks: Definition, Overview & Methods
In this lesson, we will discuss the need for vulnerability assessments in industrial networks, and its goals. We will also see the methods used in ICS and SCADA systems to conduct vulnerability assessment.
6. Vulnerability Management in ICS: Patching, Configuration, Devices & Quarantine
This lesson explores vulnerability management in industrial control systems (ICS). You will mainly learn about patch management, configuration management as well as device removal and quarantine.
7. Classifying & Ranking Risks in Industrial Networks: Process & Examples
In this lesson, we will look into the risk assessment and management in Industrial Networks. We will delve into specific related courses of action: risk ranking and classification with the help of a few examples.
8. Required Assignments Reminder
Sorry for the interruption to your course progress! We wanted to make sure you knew this course has a written assignment requirement in order to be completed. Read on to learn where to find these assignments and how to submit them.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Computer Science 330: Critical Infrastructure Security course
- Introduction to Industrial Networks & Control Systems
- Industrial Network Security & Threats
- Industrial Network Design & Architecture
- Network Protocols in Industrial Networks
- Implementing Secure Zones & Conduits in Industrial Networks
- Protecting Industrial Networks Using Security & Access Controls
- Detecting Threats, Exceptions & Anomalies in Critical Infrastructure
- Monitoring the Security of Industrial Networks
- Policies, Procedures & Standards for ICS & SCADA Systems
- Required Assignments for Computer Science 330