Industrial communication networks — Network and system security — Part 3-1: Security technologies fo...
counter-measures, and technologies that may effectively apply to the modern electronically
based IACSs regulating and monitoring numerous industries and critical infrastructures. It
describes several categories of control system-centric cybersecurity technologies, the types of
products available in those categories, the pros and cons of using those products in the
automated IACS environments,…