1. (Knapp & Langill, Ch. 11) Discuss threat detection applied to ICS cyber security. Include the concepts of event correlation, data enrichment, event normalization and cross-source correlation.
1. (Knapp & Langill, Ch. 11) Discuss threat detection applied to ICS cyber security. Include the concepts of event correlation, data enrichment, event normalization and cross-source correlation.