Devices

Possible Attack Vectors

Possible Attack Methods

Possible Consequences

Controller (PLC)

Engineering Workstation

Engineer/technician misuse

Manipulation of controlled processes

Operator HMI

Network exploitation of industrial protocol

Controller fault condition

Standalone Engineering tools

Know vulnerability

Manipulation inputs/outputs data to/from controller

Rogue device in control zone

Network replay attack

Plant upset/ shutdown

USB/Removable media

Network DoS via communication buffer overflow

Command and control

Controller network

Direct code/malware injection via USB

Controller (device) network

Direct access to device via rogue network/remote control