Describe the cybersecurity threats to a manufacturing system.
Description should demonstrate an understanding that
- an action might exploit a vulnerability to breach security and cause potential harm
- threats come from many sources (e.g., insider threats, network threats, physical threats such as fire or floods, threats stemming from software systems or user actions).
Teacher Resource:
Process/Skill Questions:
- What is considered the most costly cybersecurity threat to manufacturing systems?
- What is the purpose of the Open Web Application Security Project (OWASP)?
- What are the top 10 projects in OWASP? How do these projects benefit the manufacturing systems?
- What does the Cybersecurity Trends Report for the current year list as the top threats?