Threat Model
Security Report
Model Name
Stencils
Zone
Network Device
External Entity
Host Device
Embedded Device
ICS Function
Counter- measure
Threat Modeling Report
No ICS function exported
I1: How can an attacker send false data to any of the processes that are part of the ICS function, or tamper with legitimate data being sent by the ICS function?
-
I2: How can an attacker program/change logic (e.g., trip values, set points) in any of the processes that are part of the ICS function?
-
A1: How can an attacker deny the arrival of data send between the processes that are part of the ICS function?
-
A2: How can an attacker deny the service of the processes that are part of the ICS function?
-
A3: How can an attacker deny the service of the devices involved in realising the ICS function?
-
C1: How can an attacker obtain sensitive information from the ICS function?
-
Properties
Name
Attributes
Add Attribute