What are the five main parts of Chapter 4?
Security Challenges in Industrial Networks; Standards and Regulations; Attacks on Industrial Networks; Threat Modelling and Taxonomy of Attacks; Landscape of Security Approaches.
Why are modern industrial networks more exposed than historical ones?
Because recent industrial networks increasingly use COTS technology, Ethernet, IP networking, and connectivity to enterprise networks and remote services.
What characterized historical industrial networks?
They were often proprietary, vertically integrated, customized, used specialized communication, had very long service lifetimes, and were not designed with security in mind.
What does COTS stand for in the ICS context?
COTS means commercial-off-the-shelf technologies such as standard operating systems, applications, networking equipment, and IT protocols.
Why does COTS increase security risk in ICS?
Because widely used standard technologies bring the vulnerabilities of general IT systems into industrial environments.
Why does connectivity to enterprise LANs increase ICS risk?
Because it improves business visibility and remote access, but also creates paths for attacks to reach control environments.
Why is IP networking a major security challenge for ICS?
Because many legacy protocols are wrapped in TCP or UDP and most new devices have Ethernet ports, exposing formerly isolated systems to network-based attacks.
What simple formula summarizes modern ICS risk in the lecture?
COTS + IP + connectivity = many security risks.
Why do modern ICS inherit enterprise-network threats?
Because modern industrial networks increasingly use the same operating systems, protocols, and network services as enterprise IT.
Which classic threats are explicitly mentioned as modern ICS risks?
Worms, viruses, DoS and DDoS, unauthorized access, unknown access paths, and unpatched systems.
What does the lecture say about vulnerability exploit paths into industrial systems?
A large share of publicly disclosed vulnerabilities is exploitable over the network.
Why are network-exploitable vulnerabilities especially dangerous in ICS?
Because remote exploitation scales easily and can reach critical systems without physical access.
Why are legacy industrial devices a security problem?
Because many were never designed to provide security features and are hard or impossible to update.
Why is legacy industrial communication difficult to protect?
Because old protocols and devices often lack native support for authentication, authorization, and encryption.
Why are unsecured physical ports dangerous in ICS?
Because unauthorized personnel with physical access may directly connect to devices or networks.
Why is fragile software a major ICS problem?
Because industrial software is often not security-tested and some devices can crash even under simple scans.
Why can routine IT scanning itself be a problem in ICS?
Because some industrial devices are so fragile that even benign vulnerability scans can trigger denial of service.
Why are intentional backdoors especially dangerous in ICS devices?
Because vendor-added maintenance shortcuts can provide attackers with direct access paths.
Why do modern industrial devices often have more software risk than older ones?
Because more complexity, more code, embedded web servers, and unnecessary services increase the attack surface.
Why do ICS devices need patching just like IT servers?
Because they increasingly run standard software components and therefore accumulate known vulnerabilities.
Why are many industrial systems patched late or not at all?
Because patches can break ICS functionality, require reboots, void warranties, and need vendor certification and lab testing.
Why is rebooting a security-relevant issue in ICS patching?
Because rebooting threatens availability, which is a primary operational concern in industrial environments.
What is the practical consequence of delayed patching in ICS?
Operators often continue using outdated and known-vulnerable software components.
Why is the use of anti-virus often limited in industrial systems?
Because host security tools can consume resources, interfere with operations, or introduce instability.