Open
Description
We should investigate the STPA documentation and create attack steps associated with TooEarly/TooLate/TooLong/NotLongEnough disruptions to the information transmitted. This will likely need to be implemented in the following assets:
- IcsSystem
- Controller
- IcsData
- IcsControlData
- Signal
- ControlSignal
Right now they are all subsumed under the Manipulate attack steps, but we may want more granular modelling of the distinct manipulations.
Metadata
Metadata
Assignees
Labels
No labels