ABSTRACT

In Chapter 2, we discussed the various threats and threat agents aligned against ICS, according to available intelligence, observations, and cited opinions from reputable sources in this ¤eld. Vulnerabilities are what threats take advantage of in order to compromise assets, ICS or otherwise. Vulnerabilities aect the likelihood that a threat will be successful in an attack and subsequent attempt to compromise, and vulnerabilities are a major part of the formula behind risk: the nature of the vulnerability inœuences the likelihood of a threat being successful in exploiting it. e other half of a risk formula is the severity of the resulting impact after the assets have been compromised.