Description should demonstrate an understanding that
- an action might exploit a vulnerability to breach security and cause potential harm
- threats come from many sources (e.g., insider threats, network threats, physical threats such as fire or floods, threats stemming from software systems or user actions).
Teacher Resources:
Process/Skill Questions:
- What is currently considered the costliest cybersecurity threat to manufacturing systems?
- What is the purpose of OWASP?
- What are the top 10 projects in OWASP? How do these projects benefit the manufacturing systems?