Cyber Physical System Vulnerabilities

12345678910111213141516171819202122232425262728293031323334353637
Across
  1. 3. published vulnerabilities
  2. 4. an attack designed to interfere with the normal operation of a system
  3. 6. people with knowledge and access may present the most serious threat
  4. 7. __________ between CPSs is often accomplished using low energy wireless communication
  5. 9. interconnection of multiple devices creates additional attack surfaces
  6. 11. often motivated by regional and/or international conflicts
  7. 13. some system are outdated and lack modern security features
  8. 14. assumption that it is more expensive to do security correctly
  9. 16. belief that short range communication is secure simply because of distance
  10. 18. sometimes not encrypted because of low power
  11. 23. hacking for financial gain
  12. 25. users should have only the privilege required to do their job and only for the time that they need it
  13. 27. e.g. not resetting default passwords or falling for fishing scams
  14. 29. people think they know how to manage/use their computers but may put too much faith in computing
  15. 30. malicious code executed on a system
  16. 33. bot created to brick CPSs with default passwords
  17. 35. connecting unnecessary devices to the internet
  18. 36. lack of understanding of security and/or security protocols
  19. 37. easy to get the tools and the knowledge to attach CPSs
Down
  1. 1. because CPS systems can often be accessed via the internet or even physically, they are considered to be ________-__________
  2. 2. limit the ability of systems to be accessed remotely, especially with privilege
  3. 5. everyone has there own moral compass and decision making processes
  4. 8. malicious system interjected into the network to either sniff or interrupt traffic
  5. 10. humans treat security as an afterthought
  6. 12. low power, often with limited power
  7. 15. gaining access through impersonation
  8. 17. connection between physical and digital
  9. 19. The fact that CPSs are _______ adds another layer of attack vectors
  10. 20. attack designed to interrupt weak network traffic between CPSs
  11. 21. inconsistent software/security between components
  12. 22. inadequate education of employees to monitor systems
  13. 24. likely to be installed but not patched
  14. 26. low processing ability for computation
  15. 28. making sure that user accounts are managed to eliminate unused accounts and unneeded privilege
  16. 31. lack of login security, two-factor, etc.
  17. 32. lack of segmentation of network infrastructure
  18. 34. an example of a light weight, low energy communication protocol