I1: How can an attacker send false data to any of the processes that are part of the ICS function, or tamper with legitimate data being sent by the ICS function?
-
I2: How can an attacker program/change logic (e.g., trip values, set points) in any of the processes that are part of the ICS function?
-
A1: How can an attacker deny the arrival of data send between the processes that are part of the ICS function?
-
A2: How can an attacker deny the service of the processes that are part of the ICS function?
-
A3: How can an attacker deny the service of the devices involved in realising the ICS function?
-
C1: How can an attacker obtain sensitive information from the ICS function?
-