3.8 Cyber Security Issues Affecting Distribution

3.8.1 Cyber Security Vulnerabilities and Attacks

The threats can be realized by many different types of attacks, some of which are illustrated in Figure 20. Often an attack takes advantage of a vulnerability, which may be due to human carelessness, an inadequately designed system, or circumstances such as a major storm. As can be seen, the same type of attack can often be involved in different security threats. This web of potential attacks means that there is not just one method of meeting a particular security requirement: each of the types of attacks that present a specific threat needs to be countered.

Although importance of specific cyber threats can vary greatly depending upon the assets being secured, some of the more common human and system vulnerabilities that enable attacks are:

Some common types of attacks include:

Figure 20 : Security Requirements, Threats, and Possible Attacks