UsefulLinks
Computer Science
Cybersecurity
Cyber-Physical Systems Security
1. Fundamentals of Cyber-Physical Systems
2. Industrial Control System Architectures
3. Industrial Communication Protocols
4. Embedded Systems in CPS
5. CPS Application Domains
6. CPS Security Fundamentals
7. Threat Landscape Analysis
8. Historical CPS Security Incidents
9. Network Security for CPS
10. Host and Device Security
11. Cryptography and Data Protection
12. Physical Security Measures
13. Secure Development Practices
14. Incident Response and Forensics
15. Standards and Regulatory Frameworks
16. Advanced Security Technologies
17. Future Directions and Emerging Trends
9.
Network Security for CPS
9.1.
Network Architecture Design
9.1.1.
Network Segmentation
9.1.1.1.
IT/OT Separation
9.1.1.2.
Zone-Based Architecture
9.1.1.3.
VLAN Implementation
9.1.2.
The Purdue Model
9.1.2.1.
Level 0 through Level 5
9.1.2.2.
Data Flow Control
9.1.2.3.
Security Zones
9.1.3.
Industrial DMZ Design
9.1.3.1.
Purpose and Function
9.1.3.2.
Component Placement
9.1.3.3.
Access Control
9.2.
Perimeter Security Controls
9.2.1.
Firewalls for Industrial Networks
9.2.1.1.
Stateful Inspection
9.2.1.2.
Application Layer Filtering
9.2.1.3.
Protocol-Aware Filtering
9.2.2.
Intrusion Detection Systems
9.2.2.1.
Signature-Based Detection
9.2.2.2.
Anomaly-Based Detection
9.2.2.3.
Behavioral Analysis
9.2.3.
Intrusion Prevention Systems
9.2.3.1.
Active Response Mechanisms
9.2.3.2.
Automated Blocking
9.3.
Secure Remote Access
9.3.1.
VPN Technologies
9.3.1.1.
Site-to-Site VPNs
9.3.1.2.
Remote Access VPNs
9.3.1.3.
VPN Protocols
9.3.2.
Multi-Factor Authentication
9.3.2.1.
Token-Based Authentication
9.3.2.2.
Biometric Authentication
9.3.2.3.
Certificate-Based Authentication
9.3.3.
Jump Servers and Bastion Hosts
9.4.
Network Monitoring and Analysis
9.4.1.
Traffic Analysis
9.4.2.
Protocol Monitoring
9.4.3.
Anomaly Detection
9.4.4.
Security Information and Event Management
Previous
8. Historical CPS Security Incidents
Go to top
Next
10. Host and Device Security