confidentiality, integrity, availability
The security of a system, application, or protocol is always relative to:
– a set of desired properties
– an adversary with specific capabilities
Control systems
sensor, system, actuator, controller
Open – loop
Desired output response -> controller -> actuator -> process -> output
closed – loop
Desired output response -> error -> controller -> actuator -> process -> output