Cyber Physical System Vulnerabilities
Across
- 3. published vulnerabilities
- 4. an attack designed to interfere with the normal operation of a system
- 6. people with knowledge and access may present the most serious threat
- 7. __________ between CPSs is often accomplished using low energy wireless communication
- 9. interconnection of multiple devices creates additional attack surfaces
- 11. often motivated by regional and/or international conflicts
- 13. some system are outdated and lack modern security features
- 14. assumption that it is more expensive to do security correctly
- 16. belief that short range communication is secure simply because of distance
- 18. sometimes not encrypted because of low power
- 23. hacking for financial gain
- 25. users should have only the privilege required to do their job and only for the time that they need it
- 27. e.g. not resetting default passwords or falling for fishing scams
- 29. people think they know how to manage/use their computers but may put too much faith in computing
- 30. malicious code executed on a system
- 33. bot created to brick CPSs with default passwords
- 35. connecting unnecessary devices to the internet
- 36. lack of understanding of security and/or security protocols
- 37. easy to get the tools and the knowledge to attach CPSs
Down
- 1. because CPS systems can often be accessed via the internet or even physically, they are considered to be ________-__________
- 2. limit the ability of systems to be accessed remotely, especially with privilege
- 5. everyone has there own moral compass and decision making processes
- 8. malicious system interjected into the network to either sniff or interrupt traffic
- 10. humans treat security as an afterthought
- 12. low power, often with limited power
- 15. gaining access through impersonation
- 17. connection between physical and digital
- 19. The fact that CPSs are _______ adds another layer of attack vectors
- 20. attack designed to interrupt weak network traffic between CPSs
- 21. inconsistent software/security between components
- 22. inadequate education of employees to monitor systems
- 24. likely to be installed but not patched
- 26. low processing ability for computation
- 28. making sure that user accounts are managed to eliminate unused accounts and unneeded privilege
- 31. lack of login security, two-factor, etc.
- 32. lack of segmentation of network infrastructure
- 34. an example of a light weight, low energy communication protocol