This site has been deprecated in favor of https://attack.mitre.org and will remain in place until 11/1/22.

Difference between revisions of "Reference/536"

From attackics
Jump to navigation Jump to search
(Created page with "{{Reference |key=mitigation - CSIAC discovery assets |url=https://www.csiac.org/journal-article/practical-industrial-control-system-ics-cybersecurity-it-and-ot-have-converged-...")
 
 
Line 3: Line 3:
 
|url=https://www.csiac.org/journal-article/practical-industrial-control-system-ics-cybersecurity-it-and-ot-have-converged-discover-and-defend-your-assets/
 
|url=https://www.csiac.org/journal-article/practical-industrial-control-system-ics-cybersecurity-it-and-ot-have-converged-discover-and-defend-your-assets/
 
|authors=D. Parsons and D. Wylie
 
|authors=D. Parsons and D. Wylie
 +
|month=September
 +
|year=2019
 
|title=Practical Industrial Control System (ICS) Cybersecurity: IT and OT Have Converged – Discover and Defend Your Assets
 
|title=Practical Industrial Control System (ICS) Cybersecurity: IT and OT Have Converged – Discover and Defend Your Assets
 
|retrieved=2020/09/25
 
|retrieved=2020/09/25
 
}}
 
}}

Latest revision as of 12:41, 25 September 2020