Module 6: Vulnerabilities

Description

Vulnerabilities are weaknesses that enable threats to be actualized. This module discusses cybersecurity vulnerabilities in general and those that are of a higher concern for critical infrastructure systems. It also identifies processes and tools for discovering vulnerabilities.

Objectives

# Revised Bloom’s  Taxonomy Objective Slide # Act. 1 Team Act Assess Ques #
6.1 Understand Identify the common vulnerabilities associated with Control Systems (CS). 4 – 16 N/A 4
6.2 Understand Describe how an attacker may gain control of the SCADA system. 17 – 21 N/A 11
6.3 Understand Identify SCADA cyber vulnerabilities. 22 – 28 N/A 2
6.4 Understand Define vulnerability assessment and explain why it is important. 30-31 N/A 1
6.5 Understand Identify vulnerability assessment techniques and tools, such as CSET, Nessus, and other assessment tools. 32-34 N/A X 5 – 10
6.6 Understand Explain the differences between vulnerability scanning and penetration testing. 30 N/A X 3

License

Icon for the Creative Commons Attribution 4.0 International License

Critical Infrastructure Systems by NCyTE Center is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.

Share This Book