To expand on what you have learned in this chapter, visit the following links:
- RSA Conf. ICS Attack: https://www.rsaconference.com/writable/presentations/file_upload/tech-f02-intelligence-driven-industrial-security-with-case-studies-in-ics-attacks-final.pdf
- Implementing the Dragos Platform to Solve ICS Cybersecurity Challenges in the Electric Industry: https://dragos.com/wp-content/uploads/Dragos-Challenges-In-The-Electric-Industry-Case-Study.pdf
- Threat Landscape for Industrial Automation Systems: https://ics-cert.kaspersky.com/reports/2018/03/26/threat-landscape-for-industrial-automation-systems-in-h2-2017/
- Penetration Testing for Internet of Things and Its Automation: https://www.researchgate.net/publication/330881119_Penetration_Testing_for_Internet_of_Things_and_Its_Automation/link/5c633cdf299bf1d14cc1f1f4/download
- SCADA hacker's toolset: https://scadahacker.com/tools.html
- IoT device penetration testing: https://owasp.org/www-chapter-pune/IoT_Device_Pentest_by_Shubham_Chougule...