Resources - Paiet/Capstone GitHub Wiki

https://www.securicon.com/ingredients-for-an-ics-lab-how-to-build-an-ics-lab-from-scratch-part-1/

# Citation
1 Catherine, Catherine. “Purdue Model for Industrial Control System (ICS).” Https://Www.Lannerinc.Com/, 20 July 2022, https://www.lannerinc.com/news-and-events/eagle-lanner-tech-blog/purdue-model-for-industrial-control-system-ics#:~:text=Level%202%20%E2%80%93%20Area%20supervisory%20control,monitor%2C%20and%20control%20physical%20processes.
This article explains the Purdue Model for ICS that we are basing our project off of.
2 Kirkpatrick, Keith. “Protecting Industrial Control Systems.” Communications of the ACM, vol. 62, no. 10, Sept. 2019, pp. 14–16. October 2019, https://doi.org/10.1145/3355377.
Finding, and plugging, the security holes in SCADA.
3 Lanotte, Ruggero, et al. “Industrial Control Systems Security via Runtime Enforcement.” ACM Transactions on Privacy and Security, July 2022, p. 3546579. DOI.org (Crossref), https://doi.org/10.1145/3546579.
This paper explores securing ICS's through runtime enforcement
4 Rocchetto, Marco, and Nils Ole Tippenhauer. “Towards Formal Security Analysis of Industrial Control Systems.” Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, Association for Computing Machinery, 2017, pp. 114–26. ACM Digital Library, https://doi.org/10.1145/3052973.3053024.
This paper explores methods to attack ICSs on 'Cyber-Physical systems' or through the Physical Acceess layer
5 Mern, J., et al. “Autonomous Attack Mitigation for Industrial Control Systems.” 2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops , pp. 28–36, https://doi.ieeecomputersociety.org/10.1109/DSN-W54100.2022.00015.
This article explores avenues of autonomously securing ICSs
6 Rocchetto, Marco, and Nils Ole Tippenhauer. “Towards Formal Security Analysis of Industrial Control Systems.” Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, Association for Computing Machinery, 2017, pp. 114–26. ACM Digital Library, https://doi.org/10.1145/3052973.3053024.
This article presents a study of current threats to industrial systems and some perspectives on them.
7 Palo Alto Networks Cybersecurity Academy: Log in to the Site. https://paloaltonetworksacademy.net/pluginfile.php/445353/mod_assign/introattachment/0/EDU-210-90b-Lab%20Guide.pdf?forcedownload=1. Accessed 16 Oct. 2022.
This PDF is documentation on how to set up Palo Alto Firewalls.
8 "Industrial Network Security" by Eric D. Knapp and Joel Thomas Langill - This book covers the fundamentals of industrial network security, including how to assess risk, design secure architectures, and implement effective security solutions.
3. "Applied Cyber Security for Smart Grids" by Prof. Dr. Ahmed F. Al-Salihy and Prof. Dr. Ahmed M. Al-Hussein - This book focuses on the security of smart grids, which are electrical grids that use advanced technologies to manage energy distribution. It covers topics such as cyber threats, risk management, and secure communication protocols.
4. "Industrial Control Systems Security and Resiliency: Navigating the Cyber Security Storm" by Maciej Kranz and Omar Santos - This book provides a comprehensive guide to securing industrial control systems, including best practices for threat detection, incident response, and risk management.
5. "ICS Cybersecurity Handbook" by the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) - This handbook provides guidance for securing industrial control systems, including strategies for risk management, incident response, and vulnerability management.
6. "The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics" by John Sammons - This book covers the basics of digital forensics, including how to collect, analyze, and present digital evidence. It is applicable to a wide range of digital investigations, including those involving industrial control systems.
7. "Digital Forensics with Open Source Tools" by Cory Altheide and Harlan Carvey - This book provides a practical guide to digital forensics using open source tools. It covers topics such as data acquisition, analysis, and reporting.
8. "Practical Industrial Control Network Security: A SCADA and ICS Security Handbook" by Ilya Shmulevich and Joel Langill - This book focuses on the security of SCADA and other industrial control systems. It covers topics such as network security, vulnerability management, and incident response.
9. "Cybersecurity for Industrial Control Systems: A New Approach" by Tyson Macaulay, Bryan L. Singer, and Derek Harp - This book provides a new approach to securing industrial control systems, including strategies for risk management, threat detection, and incident response.