Describe the cybersecurity threats to a manufacturing system.

Description should demonstrate an understanding that

  • an action might exploit a vulnerability to breach security and cause potential harm
  • threats come from many sources (e.g., insider threats, network threats, physical threats such as fire or floods, threats stemming from software systems or user actions).

Teacher Resource:

Process/Skill Questions:

  • What is considered the most costly cybersecurity threat to manufacturing systems?
  • What is the purpose of the Open Web Application Security Project (OWASP)?
  • What are the top 10 projects in OWASP? How do these projects benefit the manufacturing systems?
  • What does the Cybersecurity Trends Report for the current year list as the top threats?