You will need to review the hardware, software, vertical, information and/or system for vulnerabilities.  A few examples are listed below for your reference but may not apply specifically to your project assignment.

    Typical Control System Architecture and Components
        Contained / Interconnected Trusts, Wide Area / Local Area
        Proprietary / Standardized
        Types of Monitoring Sensors and Devices Controlled
        Administrative software, user passwords, fuzzing tools

    Communication Analysis
        What communication protocols are used (Specific RF, OSI Layer 2/3, WAN/LAN)
        How does your topic protect the communication channels?
        Protocol analysis (secure/insecure channels, control bits)

    Associated Vendors and/or Governing Entities
        Provide a list of governing entities, hardware and software vendors, and integrators (International)
        Is this specific topics control system cyber assets regulated by the government?

    Vertical awareness to cybersecurity
        Do the associated vendors and/or government entities have a security domain listed on their homepage (the actual word security associated with cyber) and/or a subdomain of security www.company.com/security associated with cyber)?  Include Yes / No responses to both.
        Are there any cybersecurity regulations, standards or guidance directly applicability to the vertical?

    Known Vulnerabilities
        Did you identify any known cyber or physical-cyber vulnerabilities described publicly pertaining to your topic?

    Public Information
        Attempt to find items of information made publicly available through a search engine (ie. BING or Google) that you consider to be sensitive.  Please a description of the information, why you consider it to be sensitive and the location on the Internet.

                                                                                                                                      Order Now