Devices | Possible Attack Vectors | Possible Attack Methods | Possible Consequences |
Controller (PLC) | Engineering Workstation | Engineer/technician misuse | Manipulation of controlled processes |
| Operator HMI | Network exploitation of industrial protocol | Controller fault condition |
| Standalone Engineering tools | Know vulnerability | Manipulation inputs/outputs data to/from controller |
| Rogue device in control zone | Network replay attack | Plant upset/ shutdown |
| USB/Removable media | Network DoS via communication buffer overflow | Command and control |
| Controller network | Direct code/malware injection via USB |
|
| Controller (device) network | Direct access to device via rogue network/remote control |
|