IT Rules for Cybersecurity of control systems

How far should we go in adopting IT type rules for the management of cybersecurity on control systems. Will treating a control system as just another set of PCC's (from the IT perspective) cause more problems?

This was originally posted in "The Process Automation Usability Project" by the Gary Law. See the responses he got there and contribute with your own here.

What are your comments?

You cannot post comments until you have logged in. Login Here.

Comments

No one has commented on this page yet.

RSS feed for comments on this page | RSS feed for all comments