Reader small image

You're reading from  Pentesting Industrial Control Systems

Product typeBook
Published inDec 2021
PublisherPackt
ISBN-139781800202382
Edition1st Edition
Right arrow
Author (1)
Paul Smith
Paul Smith
author image
Paul Smith

Paul Smith has spent close to 20 years in the automation control space, tackling the "red herring" problems that are thrown his way. He has handled unique issues such as measurement imbalances resulting from flare sensor saturation, database migration mishaps, and many more. This ultimately led to the later part of his career, where he has been spending most of his time in the industrial cybersecurity space pioneering the use of new security technology in the energy, utility, and critical infrastructure sectors, and helping develop cybersecurity strategies through the use of red team/pentest engagements, cybersecurity risk assessments, and tabletop exercises for some of the world's largest government contractors, industrial organizations, and municipalities.
Read more about Paul Smith

Right arrow

How are packets formed?

To fully comprehend what is occurring in the network, let's do a quick packet 101. Packets are byte-sized relays of data, and they carry information between a source asset and a destination asset. Focusing on the traffic that powers the internet, protocols such as Transmission Control Protocol (TCP) and Internet Protocol (IP) make up the well-known acronym TCP/IP. These relays of data route through a series of switches and are reassembled, allowing us to send emails, navigate websites, download patches for software, stream movies, monitor elevators, manage trains, manufacture products, produce energy, and many more interesting and dynamic things.

To fully understand packets and how they work, it is important to understand how they flow through the layers of the Open Systems Interconnection (OSI) model. In the mid-80s, the OSI model was created and adopted to set a standard for describing the seven layers that systems use in order to communicate over...

lock icon
The rest of the page is locked
Previous PageNext Page
You have been reading a chapter from
Pentesting Industrial Control Systems
Published in: Dec 2021Publisher: PacktISBN-13: 9781800202382

Author (1)

author image
Paul Smith

Paul Smith has spent close to 20 years in the automation control space, tackling the "red herring" problems that are thrown his way. He has handled unique issues such as measurement imbalances resulting from flare sensor saturation, database migration mishaps, and many more. This ultimately led to the later part of his career, where he has been spending most of his time in the industrial cybersecurity space pioneering the use of new security technology in the energy, utility, and critical infrastructure sectors, and helping develop cybersecurity strategies through the use of red team/pentest engagements, cybersecurity risk assessments, and tabletop exercises for some of the world's largest government contractors, industrial organizations, and municipalities.
Read more about Paul Smith