Week 8 Flashcards
CPS Vulnerabilities
Identification of security gaps and vulnerability assessment in CPS.
Causes of vulnerabilities include isolation assumption, increased connectivity, heterogeneity, USB usage, bad practices, spying, homogeneity, and suspicious employees.
Types of CPS Vulnerabilities
Categorization into cyber, physical, technical, platform, and management vulnerabilities.
Examples of cyber vulnerabilities in Inter-control Center Communications Protocol (ICCP), TCP/IP, and communication protocols like Modbus.
Physical vulnerabilities involving insufficient security for components, susceptibility to tampering, and risks to medical devices.
Technical vulnerabilities arising from human awareness and skill deficiencies.
Platform vulnerabilities related to configuration, hardware, software, and lack of protection.
Management vulnerabilities due to the absence of security policies and standards.
False Data Injection (FDI) Attacks
FDI attacks target actuators or sensors in control systems, causing physical impact.
These attacks can lead to significant physical damage, and security mechanisms need to complement traditional technologies like encryption and authentication.
Covert/Stealthy Attacks
Challenges in detecting adaptive adversaries aiming to raise pressure without being noticed.
Different types of stealthy FDI attacks, including surge attacks, bias attacks, and geometric attacks, each with varying levels of perturbation and damage.
Fuzzing in CPS Security
Fuzz testing as an automated method to reveal software defects and vulnerabilities in CPS.
Various fuzzing tools, such as beSTORM, Sulley, SMOD, and modbus-cli, used for testing ICS components.