Explore defensive counting techniques for accurately quantifying industrial control system (ICS) exposure on the Internet in this 21-minute conference talk from BSidesLV. Delve into the challenges of distinguishing real ICS devices from honeypots and personal projects when analyzing Internet-connected systems speaking ICS protocols. Learn about the comprehensive analysis process, from data collection to device verification, and understand the importance of contextualizing exposure numbers. Gain insights into why critical thinking is essential when interpreting Internet-based security research, and discover methods for painting a more accurate picture of ICS device exposure in critical infrastructure environments.
Overview
Syllabus
Ground Truth, Tue, Aug 6, 17:00 - Tue, Aug 6, CDT
Taught by
BSidesLV