{"id":2973,"date":"2024-10-28T09:06:42","date_gmt":"2024-10-28T08:06:42","guid":{"rendered":"https:\/\/www.spacesecurity.info\/how-to-attack-industrial-control-systems-ics\/"},"modified":"2024-10-28T09:06:42","modified_gmt":"2024-10-28T08:06:42","slug":"how-to-attack-industrial-control-systems-ics","status":"publish","type":"post","link":"https:\/\/www.spacesecurity.info\/en\/how-to-attack-industrial-control-systems-ics\/","title":{"rendered":"How to model an attack on an Industrial Control Systems (ICS)"},"content":{"rendered":"<p>Attacks on OT (Operational Technology)\u00a0systems are made easier due to the OT\/IT convergence.<\/p>\n<p>The figure below is showing an example of OT\/IT convergence.<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/OT-IT-convergence.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2950\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/OT-IT-convergence.jpg\" alt=\"\" width=\"1018\" height=\"468\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/OT-IT-convergence.jpg 1018w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/OT-IT-convergence-300x138.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/OT-IT-convergence-768x353.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/OT-IT-convergence-696x320.jpg 696w\" sizes=\"auto, (max-width: 1018px) 100vw, 1018px\" \/><\/a><\/p>\n<p>Attacks on OT and ICS systems are modeled by the ICS Cyber Kill Chain and the MITRE ATT&amp;CK for ICS Matrix\u00a0described below.<\/p>\n<h2>ICS Cyber Kill Chain<\/h2>\n<p>Published by SANS in 2015 by Michael Assante and Robert M. Lee as an adaptation of the traditional cyber kill chain developed by Lockheed Martin analysts as it applied to ICSs.<\/p>\n<p>The ICS Cyber Kill Chain details the steps an adversary must follow to perform a high\u2010confidence attack on the ICS process and\/or cause physical damage to equipment in a predictable and controllable way.<\/p>\n<p>ICS Cyber Kill Chain has Two stages:<\/p>\n<ul>\n<li>Stage 1 : Cyber Intrusion Preparation and Execution \u2013 \u00ab IT \u00bb<\/li>\n<li>Stage 2 : ICS Attack Developpement and Execution \u2013 \u00ab\u00a0OT\u00a0\u00bb<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/2-stages-ICS-Cyber-Kill-Chain.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2946\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/2-stages-ICS-Cyber-Kill-Chain.jpg\" alt=\"\" width=\"526\" height=\"729\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/2-stages-ICS-Cyber-Kill-Chain.jpg 526w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/2-stages-ICS-Cyber-Kill-Chain-216x300.jpg 216w\" sizes=\"auto, (max-width: 526px) 100vw, 526px\" \/><\/a><\/p>\n<h2>ICS Cyber Kill Chain mapped to the ICS Zoned Architecture<\/h2>\n<p>ICS Zoned Architecture (left) : This is the Purdue Model for ICS Security<\/p>\n<p>Cyber Kill Chain for Industrial Control Systems (right) : This is an ICS Attack as Cascading Events<\/p>\n<p>The ICS Cyber Kill Chain is a powerful approach for Neutralizing a Cyber Attack reducing ICS cyber risk. Security Engineering has the challenge to Kill the Kill Chain<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ICS-Zoned-Architecture.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-2948\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ICS-Zoned-Architecture.jpg\" alt=\"\" width=\"799\" height=\"690\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ICS-Zoned-Architecture.jpg 799w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ICS-Zoned-Architecture-300x259.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ICS-Zoned-Architecture-768x663.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ICS-Zoned-Architecture-696x601.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ICS-Zoned-Architecture-534x462.jpg 534w\" sizes=\"auto, (max-width: 799px) 100vw, 799px\" \/><\/a><\/p>\n<h2>ICS Cyber Kill Chain applied to STUXNET<\/h2>\n<p>The figure below is the ICS Cyber Kill Chain applied to STUXNET<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ICS-Cyber-Kill-Chain-applied-to-Stuxnet.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-2944\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ICS-Cyber-Kill-Chain-applied-to-Stuxnet-1024x447.jpg\" alt=\"\" width=\"696\" height=\"304\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ICS-Cyber-Kill-Chain-applied-to-Stuxnet-1024x447.jpg 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ICS-Cyber-Kill-Chain-applied-to-Stuxnet-300x131.jpg 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ICS-Cyber-Kill-Chain-applied-to-Stuxnet-768x335.jpg 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ICS-Cyber-Kill-Chain-applied-to-Stuxnet-696x304.jpg 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ICS-Cyber-Kill-Chain-applied-to-Stuxnet-1068x466.jpg 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/ICS-Cyber-Kill-Chain-applied-to-Stuxnet.jpg 1173w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/p>\n<h2>About the MITRE ATT&amp;CK for ICS Matrix<\/h2>\n<p>To go futhermore convergence of IT and OT, and the concept of ICS (Industrial Control System), you can also have a look on the MITRE ATT&amp;CK for ICS Matrix.<\/p>\n<p><a href=\"https:\/\/collaborate.mitre.org\/attackics\/index.php\/Main_Page\">The MITRE ATT&amp;CK for ICS Matrix<\/a>\u00a0is\u00a0an overview of the tactics and techniques described in the ATT&amp;CK\u00a0for ICS knowledge base. It visually aligns individual techniques under the tactics in which they can be applied.<\/p>\n<figure id=\"attachment_1523\" aria-describedby=\"caption-attachment-1523\" style=\"width: 1024px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/07\/1-1024x5321-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1523 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/07\/1-1024x5321-1.png\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/07\/1-1024x5321-1.png 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/07\/1-1024x5321-1-300x156.png 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/07\/1-1024x5321-1-768x399.png 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/07\/1-1024x5321-1-696x362.png 696w\" alt=\"\" width=\"1024\" height=\"532\" \/><\/a><figcaption id=\"caption-attachment-1523\" class=\"wp-caption-text\">The MITRE ATT&amp;CK for ICS matrix (Source: https:\/\/collaborate.mitre.org\/attackics\/index.php\/Main_Page)<\/figcaption><\/figure>\n<h2>Mapping of Stuxnet attack on the ATT&amp;CK for ICS matrix<\/h2>\n<p>Below is the <em>mapping of Stuxnet attack on the ATT&amp;CK for ICS matrix (<a href=\"https:\/\/airbus-cyber-security.com\/mitre-attck-for-ics-everything-you-need-to-know\/\">Than\u2019ks to Airbus Cybersecurity<\/a>). \u00ab Mapping Stuxnet to the ATT&amp;CK for ICS matrix, as shown in figure 3, quickly shows how complex this attack was. Business risk owners can now identify which techniques to focus on if they need to minimise the risk from strikes like Stuxnet. \u00bb<\/em><\/p>\n<figure id=\"attachment_1521\" aria-describedby=\"caption-attachment-1521\" style=\"width: 1024px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/07\/Mapping-of-Stuxnet-on-the-ATTCK-for-ICS-matrix-1-1024x5321-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1521 size-full\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/07\/Mapping-of-Stuxnet-on-the-ATTCK-for-ICS-matrix-1-1024x5321-1.png\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/07\/Mapping-of-Stuxnet-on-the-ATTCK-for-ICS-matrix-1-1024x5321-1.png 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/07\/Mapping-of-Stuxnet-on-the-ATTCK-for-ICS-matrix-1-1024x5321-1-300x156.png 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/07\/Mapping-of-Stuxnet-on-the-ATTCK-for-ICS-matrix-1-1024x5321-1-768x399.png 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2021\/07\/Mapping-of-Stuxnet-on-the-ATTCK-for-ICS-matrix-1-1024x5321-1-696x362.png 696w\" alt=\"\" width=\"1024\" height=\"532\" \/><\/a><figcaption id=\"caption-attachment-1521\" class=\"wp-caption-text\">Mapping of Stuxnet on the ATT&amp;CK for ICS matrix (Source: https:\/\/airbus-cyber-security.com\/mitre-attck-for-ics-everything-you-need-to-know\/)<\/figcaption><\/figure>\n<h2>Threat modeling on OT, ICS and embedded systems<\/h2>\n<p>MITRE released in May 2024, <a href=\"https:\/\/www.spacesecurity.info\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/\">the EMB3D\u2122 model, a Cybersecurity Threat Model dedicated for Embedded Devices<\/a>.<\/p>\n<p><a href=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-large wp-image-2859\" src=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-1024x442.png\" alt=\"\" width=\"696\" height=\"300\" srcset=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-1024x442.png 1024w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-300x129.png 300w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-768x331.png 768w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-1536x663.png 1536w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-2048x883.png 2048w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-696x300.png 696w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-1068x461.png 1068w, https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/workflow-summary-1920x828.png 1920w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><\/a><\/p>\n<p>EMB3D is aligned with and expands on several existing models, including\u00a0<a href=\"https:\/\/cwe.mitre.org\/\">Common Weakness Enumeration<\/a>,\u00a0<a href=\"https:\/\/attack.mitre.org\/\">MITRE ATT&amp;CK\u00ae<\/a>, and\u00a0<a href=\"https:\/\/cve.mitre.org\/\">Common Vulnerabilities and Exposures<\/a>, but with a specific embedded-device focus. The threats defined within EMB3D are based on observation of use by threat actors, proof-of-concept and theoretical\/conceptual security research publications, and device vulnerability and weakness reports. These threats are mapped to device properties to help users develop and tailor accurate threat models for specific embedded devices.<\/p>\n<h2>To go furthermore<\/h2>\n<ul>\n<li>To know more about <a href=\"https:\/\/www.spacesecurity.info\/mitre-releases-emb3d-a-cybersecurity-threat-model-for-embedded-devices\/\">the MITRE EMB3D\u2122 Threat Model for embedded systems<\/a><\/li>\n<li>Check <a href=\"https:\/\/www.spacesecurity.info\/how-i-used-mitre-emb3d-threat-model-to-identify-siemens-plc-vulnerabilities-exploited-by-stuxnet-worm\/\">how I used MITRE EMB3D\u2122 Threat Model to identify Siemens PLC vulnerabilities exploited by Stuxnet worm<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Attacks on OT (Operational Technology)\u00a0systems are made easier due to the OT\/IT convergence. The figure below is showing an example of OT\/IT convergence. Attacks on OT and ICS systems are modeled by the ICS Cyber Kill Chain and the MITRE ATT&amp;CK for ICS Matrix\u00a0described below. ICS Cyber Kill Chain Published by SANS in 2015 by [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2951,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[38],"tags":[],"class_list":{"0":"post-2973","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-en"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to model an attack on an Industrial Control Systems (ICS) - Space &amp; Cybersecurity Info<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spacesecurity.info\/en\/how-to-attack-industrial-control-systems-ics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to model an attack on an Industrial Control Systems (ICS) - Space &amp; Cybersecurity Info\" \/>\n<meta property=\"og:description\" content=\"Attacks on OT (Operational Technology)\u00a0systems are made easier due to the OT\/IT convergence. The figure below is showing an example of OT\/IT convergence. Attacks on OT and ICS systems are modeled by the ICS Cyber Kill Chain and the MITRE ATT&amp;CK for ICS Matrix\u00a0described below. ICS Cyber Kill Chain Published by SANS in 2015 by [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spacesecurity.info\/en\/how-to-attack-industrial-control-systems-ics\/\" \/>\n<meta property=\"og:site_name\" content=\"Space &amp; Cybersecurity Info\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-28T08:06:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/OT-IT-convergence.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1018\" \/>\n\t<meta property=\"og:image:height\" content=\"468\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fran\u00e7ois Quiquet\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fran\u00e7ois Quiquet\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-to-attack-industrial-control-systems-ics\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-to-attack-industrial-control-systems-ics\\\/\"},\"author\":{\"name\":\"Fran\u00e7ois Quiquet\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/person\\\/5e36ba49bf1d87a387c9ab60c233013c\"},\"headline\":\"How to model an attack on an Industrial Control Systems (ICS)\",\"datePublished\":\"2024-10-28T08:06:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-to-attack-industrial-control-systems-ics\\\/\"},\"wordCount\":576,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-to-attack-industrial-control-systems-ics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/OT-IT-convergence.jpg\",\"articleSection\":[\"Cyber\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-to-attack-industrial-control-systems-ics\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-to-attack-industrial-control-systems-ics\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-to-attack-industrial-control-systems-ics\\\/\",\"name\":\"How to model an attack on an Industrial Control Systems (ICS) - Space &amp; Cybersecurity Info\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-to-attack-industrial-control-systems-ics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-to-attack-industrial-control-systems-ics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/OT-IT-convergence.jpg\",\"datePublished\":\"2024-10-28T08:06:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-to-attack-industrial-control-systems-ics\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-to-attack-industrial-control-systems-ics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-to-attack-industrial-control-systems-ics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/OT-IT-convergence.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/OT-IT-convergence.jpg\",\"width\":1018,\"height\":468},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/how-to-attack-industrial-control-systems-ics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to model an attack on an Industrial Control Systems (ICS)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"name\":\"Space Cybersecurity Info\",\"description\":\"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#organization\",\"name\":\"Space Security Info\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"contentUrl\":\"https:\\\/\\\/www.spacesecurity.info\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/SSI-Logo-4.jpg\",\"width\":594,\"height\":144,\"caption\":\"Space Security Info\"},\"image\":{\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/#\\\/schema\\\/person\\\/5e36ba49bf1d87a387c9ab60c233013c\",\"name\":\"Fran\u00e7ois Quiquet\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g\",\"caption\":\"Fran\u00e7ois Quiquet\"},\"description\":\"(EN) I'm a cybersecurity engineer in network, telecommunication and embedded\\\/integrated systems. Founder of the website spacesecurity.info. Passionate about cybersecurity and space, I share my two passions through this site. My goal is to federate a community around these two themes. Join my LinkedIn Group. (FR) Je suis ing\u00e9nieur cybers\u00e9curit\u00e9 en r\u00e9seau, t\u00e9l\u00e9communication et syst\u00e8mes embarqu\u00e9s et int\u00e9gr\u00e9s. Fondateur du site spacesecurity.info. Passionn\u00e9 de cybers\u00e9curit\u00e9 et du monde de l'espace, j'ai souhait\u00e9 partager mes deux passions \u00e0 travers ce site. Mon objectif est de f\u00e9d\u00e9rer une communaut\u00e9 autour de ces deux th\u00e8mes. Rejoindre mon groupe LinkedIn.\",\"sameAs\":[\"https:\\\/\\\/www.spacesecurity.info\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/francoisquiquet\\\/\"],\"url\":\"https:\\\/\\\/www.spacesecurity.info\\\/en\\\/author\\\/francois\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to model an attack on an Industrial Control Systems (ICS) - Space &amp; Cybersecurity Info","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spacesecurity.info\/en\/how-to-attack-industrial-control-systems-ics\/","og_locale":"en_US","og_type":"article","og_title":"How to model an attack on an Industrial Control Systems (ICS) - Space &amp; Cybersecurity Info","og_description":"Attacks on OT (Operational Technology)\u00a0systems are made easier due to the OT\/IT convergence. The figure below is showing an example of OT\/IT convergence. Attacks on OT and ICS systems are modeled by the ICS Cyber Kill Chain and the MITRE ATT&amp;CK for ICS Matrix\u00a0described below. ICS Cyber Kill Chain Published by SANS in 2015 by [&hellip;]","og_url":"https:\/\/www.spacesecurity.info\/en\/how-to-attack-industrial-control-systems-ics\/","og_site_name":"Space &amp; Cybersecurity Info","article_published_time":"2024-10-28T08:06:42+00:00","og_image":[{"width":1018,"height":468,"url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/OT-IT-convergence.jpg","type":"image\/jpeg"}],"author":"Fran\u00e7ois Quiquet","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Fran\u00e7ois Quiquet","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.spacesecurity.info\/en\/how-to-attack-industrial-control-systems-ics\/#article","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/how-to-attack-industrial-control-systems-ics\/"},"author":{"name":"Fran\u00e7ois Quiquet","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/person\/5e36ba49bf1d87a387c9ab60c233013c"},"headline":"How to model an attack on an Industrial Control Systems (ICS)","datePublished":"2024-10-28T08:06:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.spacesecurity.info\/en\/how-to-attack-industrial-control-systems-ics\/"},"wordCount":576,"commentCount":0,"publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/how-to-attack-industrial-control-systems-ics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/OT-IT-convergence.jpg","articleSection":["Cyber"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.spacesecurity.info\/en\/how-to-attack-industrial-control-systems-ics\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.spacesecurity.info\/en\/how-to-attack-industrial-control-systems-ics\/","url":"https:\/\/www.spacesecurity.info\/en\/how-to-attack-industrial-control-systems-ics\/","name":"How to model an attack on an Industrial Control Systems (ICS) - Space &amp; Cybersecurity Info","isPartOf":{"@id":"https:\/\/www.spacesecurity.info\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spacesecurity.info\/en\/how-to-attack-industrial-control-systems-ics\/#primaryimage"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/how-to-attack-industrial-control-systems-ics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/OT-IT-convergence.jpg","datePublished":"2024-10-28T08:06:42+00:00","breadcrumb":{"@id":"https:\/\/www.spacesecurity.info\/en\/how-to-attack-industrial-control-systems-ics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spacesecurity.info\/en\/how-to-attack-industrial-control-systems-ics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/how-to-attack-industrial-control-systems-ics\/#primaryimage","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/OT-IT-convergence.jpg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2024\/05\/OT-IT-convergence.jpg","width":1018,"height":468},{"@type":"BreadcrumbList","@id":"https:\/\/www.spacesecurity.info\/en\/how-to-attack-industrial-control-systems-ics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.spacesecurity.info\/en\/"},{"@type":"ListItem","position":2,"name":"How to model an attack on an Industrial Control Systems (ICS)"}]},{"@type":"WebSite","@id":"https:\/\/www.spacesecurity.info\/en\/#website","url":"https:\/\/www.spacesecurity.info\/en\/","name":"Space Cybersecurity Info","description":"La cybers\u00e9curit\u00e9 appliqu\u00e9e au domaine de l&#039;espace","publisher":{"@id":"https:\/\/www.spacesecurity.info\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spacesecurity.info\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.spacesecurity.info\/en\/#organization","name":"Space Security Info","url":"https:\/\/www.spacesecurity.info\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","contentUrl":"https:\/\/www.spacesecurity.info\/wp-content\/uploads\/2020\/05\/SSI-Logo-4.jpg","width":594,"height":144,"caption":"Space Security Info"},"image":{"@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.spacesecurity.info\/en\/#\/schema\/person\/5e36ba49bf1d87a387c9ab60c233013c","name":"Fran\u00e7ois Quiquet","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e50e669b3dbfb22c278a01d57cebe52e5b3900d3301faa1c4fefe35cd22d2186?s=96&d=mm&r=g","caption":"Fran\u00e7ois Quiquet"},"description":"(EN) I'm a cybersecurity engineer in network, telecommunication and embedded\/integrated systems. Founder of the website spacesecurity.info. Passionate about cybersecurity and space, I share my two passions through this site. My goal is to federate a community around these two themes. Join my LinkedIn Group. (FR) Je suis ing\u00e9nieur cybers\u00e9curit\u00e9 en r\u00e9seau, t\u00e9l\u00e9communication et syst\u00e8mes embarqu\u00e9s et int\u00e9gr\u00e9s. Fondateur du site spacesecurity.info. Passionn\u00e9 de cybers\u00e9curit\u00e9 et du monde de l'espace, j'ai souhait\u00e9 partager mes deux passions \u00e0 travers ce site. Mon objectif est de f\u00e9d\u00e9rer une communaut\u00e9 autour de ces deux th\u00e8mes. Rejoindre mon groupe LinkedIn.","sameAs":["https:\/\/www.spacesecurity.info","https:\/\/www.linkedin.com\/in\/francoisquiquet\/"],"url":"https:\/\/www.spacesecurity.info\/en\/author\/francois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/2973","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/comments?post=2973"}],"version-history":[{"count":0,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/posts\/2973\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media\/2951"}],"wp:attachment":[{"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/media?parent=2973"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/categories?post=2973"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spacesecurity.info\/en\/wp-json\/wp\/v2\/tags?post=2973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}