Useful Links
Computer Science
Cybersecurity
Cyber-Physical Systems Security
1. Fundamentals of Cyber-Physical Systems
2. Industrial Control System Architectures
3. Industrial Communication Protocols
4. Embedded Systems in CPS
5. CPS Application Domains
6. CPS Security Fundamentals
7. Threat Landscape Analysis
8. Historical CPS Security Incidents
9. Network Security for CPS
10. Host and Device Security
11. Cryptography and Data Protection
12. Physical Security Measures
13. Secure Development Practices
14. Incident Response and Forensics
15. Standards and Regulatory Frameworks
16. Advanced Security Technologies
17. Future Directions and Emerging Trends
Network Security for CPS
Network Architecture Design
Network Segmentation
IT/OT Separation
Zone-Based Architecture
VLAN Implementation
The Purdue Model
Level 0 through Level 5
Data Flow Control
Security Zones
Industrial DMZ Design
Purpose and Function
Component Placement
Access Control
Perimeter Security Controls
Firewalls for Industrial Networks
Stateful Inspection
Application Layer Filtering
Protocol-Aware Filtering
Intrusion Detection Systems
Signature-Based Detection
Anomaly-Based Detection
Behavioral Analysis
Intrusion Prevention Systems
Active Response Mechanisms
Automated Blocking
Secure Remote Access
VPN Technologies
Site-to-Site VPNs
Remote Access VPNs
VPN Protocols
Multi-Factor Authentication
Token-Based Authentication
Biometric Authentication
Certificate-Based Authentication
Jump Servers and Bastion Hosts
Network Monitoring and Analysis
Traffic Analysis
Protocol Monitoring
Anomaly Detection
Security Information and Event Management
Previous
8. Historical CPS Security Incidents
Go to top
Next
10. Host and Device Security