UsefulLinks
Computer Science
Cybersecurity
Cyber-Physical Systems Security
1. Fundamentals of Cyber-Physical Systems
2. Industrial Control System Architectures
3. Industrial Communication Protocols
4. Embedded Systems in CPS
5. CPS Application Domains
6. CPS Security Fundamentals
7. Threat Landscape Analysis
8. Historical CPS Security Incidents
9. Network Security for CPS
10. Host and Device Security
11. Cryptography and Data Protection
12. Physical Security Measures
13. Secure Development Practices
14. Incident Response and Forensics
15. Standards and Regulatory Frameworks
16. Advanced Security Technologies
17. Future Directions and Emerging Trends
7.
Threat Landscape Analysis
7.1.
Threat Actor Categories
7.1.1.
Nation-State Actors
7.1.1.1.
Capabilities and Resources
7.1.1.2.
Strategic Objectives
7.1.1.3.
Attack Sophistication
7.1.2.
Cybercriminal Groups
7.1.2.1.
Financial Motivations
7.1.2.2.
Ransomware Operations
7.1.2.3.
Data Theft
7.1.3.
Hacktivists
7.1.3.1.
Ideological Motivations
7.1.3.2.
Publicity Seeking
7.1.3.3.
Disruption Goals
7.1.4.
Insider Threats
7.1.4.1.
Privileged Access Abuse
7.1.4.2.
Unintentional Actions
7.1.4.3.
Malicious Intent
7.1.5.
Terrorist Organizations
7.1.5.1.
Physical Damage Goals
7.1.5.2.
Psychological Impact
7.2.
Attack Vectors and Methods
7.2.1.
Network-Based Attacks
7.2.1.1.
Protocol Exploitation
7.2.1.2.
Network Scanning
7.2.1.3.
Lateral Movement
7.2.2.
Physical Access Attacks
7.2.2.1.
Device Tampering
7.2.2.2.
Unauthorized Access
7.2.2.3.
Hardware Modification
7.2.3.
Supply Chain Attacks
7.2.3.1.
Component Compromise
7.2.3.2.
Software Supply Chain
7.2.3.3.
Third-Party Risks
7.2.4.
Social Engineering
7.2.4.1.
Phishing Attacks
7.2.4.2.
Pretexting
7.2.4.3.
Baiting
7.2.5.
Wireless Attacks
7.2.5.1.
Signal Interception
7.2.5.2.
Jamming Attacks
7.2.5.3.
Rogue Access Points
7.3.
CPS-Specific Attack Types
7.3.1.
Sensor Data Manipulation
7.3.1.1.
False Data Injection
7.3.1.2.
Sensor Spoofing
7.3.1.3.
Data Replay Attacks
7.3.2.
Control Logic Compromise
7.3.2.1.
PLC Programming Changes
7.3.2.2.
Logic Bomb Insertion
7.3.2.3.
Control Algorithm Modification
7.3.3.
Denial of Service Attacks
7.3.3.1.
Network Flooding
7.3.3.2.
Resource Exhaustion
7.3.3.3.
Communication Disruption
7.3.4.
Man-in-the-Middle Attacks
7.3.4.1.
Communication Interception
7.3.4.2.
Data Modification
7.3.4.3.
Command Injection
Previous
6. CPS Security Fundamentals
Go to top
Next
8. Historical CPS Security Incidents