This guide provides a general introduction into the processes and technologies of cyber security, specifically in relation to the communications that integrate an ICS. Its purpose is to help managers and decision makers to understand the cyber-security implications of existing and emerging communications technologies, and how organizations can begin the process of protecting their assets from cyber-threats.
In this paper, you will learn about:
- Where to start
- Knowing which regulations apply
- Seven strategies for network security
- Where to go for more information
This guide should be read in conjunction with;