You are on page 1of 1

Task 1. Fill in the gaps with the missing words.

A threats F digitalization
B measures G sensitive
C facilities H downtime
D target I manual
E to maintain J framework

1. Industrial control systems (ICS) are often a sitting ____ D target ____ for
cybercriminals.
2. The difference is that ____ H downtime ____ or infiltration of an ICS
network could result in massive outages, hundreds of thousands of impacted
users and even national disaster. 
3.  ICS security is a security ____ J framework ____ that protects these
systems against accidental or intentional risks.
4. Thanks to IoT and advanced sensors, these ____I manual____ processes
are not only automated but able to report on so many more readings and
send back so much more useful data.
5. Understanding some of the most common industrial control system  _ A
threats __ is the first step that any industrial organization can take to protect
their network.
6. Systems that have been upgraded to connect to a digital interface can be
easily compromised by malware or a USB device used to download ____ G
sensitive ____ data.
7. As a “headline” finding, one can say that even though over three-quarters of
the companies surveyed state that ICS cybersecurity is a major priority, they
oftentimes don’t carry out associated security ____ B measures ____ .
8. Moreover, since the companies surveyed have only just started the digital
transformation, it can be said that their attack surface will increase as they
raise their level of ____ F digitalization ____ .
9. The survey found that almost three-quarters of firms were confident or
somewhat confident in their ability ___E to maintain_____ the security of
their industrial internet of things (IIoT).
10.When designing and commissioning industrial ____C facilities____ , the
main focus is often on the economic aspects of their operation and the
physical safety of the industrial process, while information security is much
lower on the list of priorities.

You might also like