Describe the cyberattack surface of manufacturing systems.

Description should include the identification of the attack surface as being the sum of the points at which an unauthorized user can attempt to gain access to the system to extract information or disrupt processes.

Description should also include

  • network architecture segmentation
  • knowledge that companies have differing levels of vulnerability due to their integration of technology.

Process/Skill Questions:

  • What are passive attacks? 
  • What are active attacks?