Module 6: Vulnerabilities

Presentation & Readings

Required Reading

Parfomak, Paul W. Vulnerability of Concentrated Critical Infrastructure: Background and Policy Options. CRS Report for Congress, RL33206. Updated September 12, 2008. Available from the Homeland Security Digital Library.

Martel, Henry. Top 25 ICS Vulnerabilities (automation.com). This feature originally appeared in the Automation 2022 Volume 4: Cybersecurity & Connectivity Ebook.  NOTE:  Slide contents draw heavily on this public domain document. Please download and read the document in its entirety.

Cybersecurity and Infrastructure Security Agency (CISA) . Department of Homeland Security. “Overview of Cyber Vulnerabilities“.

License

Icon for the Creative Commons Attribution 4.0 International License

Critical Infrastructure Systems by NCyTE Center is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.

Share This Book