Cyber-Physical Systems Security
Preventing Physical Harm
Safety-Critical Operations
Fail-Safe Design
Continuous Operations
Fault Tolerance
Redundancy Systems
Control System Integrity
Data Integrity
Operational Consistency
Sensitive Process Data
Intellectual Property Protection
Real-time Constraints
Legacy System Integration
Physical Accessibility
Resource Limitations
Long System Lifecycles
Safety-Security Interactions
Asset Identification
Threat Identification
Vulnerability Assessment
Impact Analysis
Risk Calculation Methods
Defense in Depth
Least Privilege
Fail Secure Design
Separation of Duties
Previous
5. CPS Application Domains
Go to top
Next
7. Threat Landscape Analysis