Home
FT
STOP-IT Quantity FT
STOP-IT Water Quality FT
Import
List
SP Wizard
Risknought
Lists
Measures
Events
Tools
ST Procedures
Search
Login
Event type: Manipulation
Capabilities
Manipulation of Additives
Manipulation of Control System
Manipulation of Dosing System
Manipulation of Pressure Boosting Station
Manipulation of Pump
Manipulation of Sensor
Manipulation of Server
Manipulation of Transferred Information
Manipulation of Transmission Devices
Manipulation of Valve
Events
Gate 235 - False alarm on WDN tank contamination
Gate 237 - Outflow valve of WDN tank closed
Gate 239 - Mislead PLC controlled WDN tank refill process
Gate 247 - Mislead PBS power supply
Gate 244 - WDN PBS mislead operation
Gate 248 - Loss of WDN PBS control
Gate 251 - WDN valve mislead operation
Gate 253 - Overpressure from pump
Gate 260 - WDN control system manipulated
Gate 227 - False alarm for contamination in WTP
Gate 218 - Mismanagement of WTP system
Gate 219 - Staff controlled hydraulic processes run without WTP data
Gate 220 - Staff or PLC controlled hydraulic processes run on altered WTP data
Gate 88 - Inappropriate hydraulic operation of WWTP due to loss of control
Gate 89 - Inappropriate hydraulic operation of WWTP due to misled operation
Gate 91 - Inappropriate WWTP outflow quality due to loss of control
Gate 92 - Inappropriate WWTP outflow quality due to misled operations
Gate 190 - Surface water system mismanagement
Gate 191 - Mislead surface water management system
Gate 192 - Surface water management system functions with insufficient input data
Gate 193 - Surface water management system functions on altered data
Gate 201 - False signal for groundwater contamination
Gate 202 - Assumption of groundwater contamination by company
Gate 205 - Mismanagement of groundwater system
Gate 207 - Groundwater management system run on insufficient data
Gate 208 - Groundwater management system runs on altered data
Gate 206 - Lose control of groundwater abstraction well system
Gate 209 - Loss of groundwater abstraction well system control
Basic Event 152 - Man-in-the-Middle attack manipulates quality sensor signals
Basic Event 151 - External person physicaly manipulates tank quality sensor readings
Basic Event 240 - Upadate of OS causes false positive alarms from Event Detection System
Basic Event 235 - External person in situ manipulates WDN tank level sensor
Basic Event 236 - Man-in-the-Middle attack manipulates WDN tank level sensor signals
Basic Event 237 - Malware alters PLC statements that control WDN tank refill
Basic Event 238 - External person in situ manipulates WDN tank transmission system
Basic Event 252 - Man-in-the-Middle attack manipulates WDN PBS sensor signals
Basic Event 255 - Man-in-the-Middle attack manipulates local power transformer signals
Basic Event 250 - Malware alters PLC statements that control pump
Basic Event 251 - External person in situ manipulates PBS transmission devices
Basic Event 260 - Internal person silently takes over PBS SCADA control
Basic Event 261 - Undetected SCADA hijacking software takes control of PBS operation
Basic Event 264 - Malware alters PLC statements that control valve
Basic Event 265 - Man-in-the-Middle attack manipulates WDN valve sensor signals
Basic Event 267 - Man-in-the-Middle attack manipulates WDN valve control signals
Basic Event 275 - Malware alters WDN control statements
Basic Event 276 - SQL injection to data used for demand prediction
Basic Event 277 - Malware tampers network topology characteristics on prediction models (e.g. tank volume curve)
Basic Event 227 - Fake news about contamination in WTP using manipulated water company public communication
Basic Event 209 - External person physically manipulates WTP sensor readings
Basic Event 210 - Man-in-the-Middle attack manipulates WTP sensor signal
Basic Event 218 - Accidental errors by authorized user while maintaining information system
Basic Event 211 - External attacker manipulates WTP transmission devices
Basic Event 83 - False signal for surface water contamination
Basic Event 18 - External person breaks in WWTP and takes over SCADA
Basic Event 19 - Internal person intrudes WWTP control room and takes over SCADA
Basic Event 20 - SCADA hijacking software takes control of WWTP operation
Basic Event 23 - Man-in-the-Middle attack manipulates WWTP control signals
Basic Event 21 - WWTP operational staff faulty actions/decisions
Basic Event 22 - Man-in-the-Middle attack manipulates WWTP data transmitted from sensors
Basic Event 24 - External person physically manipulates WWTP quality sensor
Basic Event 171 - Human error in operating/using surface water management system
Basic Event 167 - External person physically manipulates surface water system sensor readings
Basic Event 168 - External person physically manipulates surface water system sensor readings
Basic Event 169 - Man-in-the-Middle attack manipulates surface water system sensor signal
Basic Event 170 - External attacker manipulates surface water system transmission devices
Basic Event 177 - External person breaks in to reservoir control area taking over SCADA
Basic Event 178 - Internal person silently takes over reservoir SCADA control
Basic Event 179 - Man-in-the-Middle attack manipulates reservoir control signals
Basic Event 186 - Quality sensor transmission wires of observation wells manipulated
Basic Event 187 - External person physically manipulates groundwater quality sensor readings
Basic Event 188 - Internal person physically manipulates groundwater quality sensor readings
Basic Event 189 - Man-in-the-Middle attack manipulates groundwater quality sensor signal
Basic Event 194 - External person manipulates transmission wires of wells
Basic Event 195 - External person manipulates data transmission system of wells
Basic Event 196 - Man-in-the-Middle attack manipulates well sensor signal
Basic Event 197 - External person physically manipulates well sensor signal
Basic Event 198 - External person breaks in to well control area and takes over SCADA
Basic Event 199 - Internal person silently takes over abstraction well SCADA control
Basic Event 201 - Malware performs DoS attack on abstraction well PLCs
Basic Event 213 - Internal person silently takes over WTP SCADA control
Basic Event 214 - Undetected SCADA hijacking software takes control of WTP operation
Basic Event 215 - Man-in-the-Middle attack manipulates WTP control signals
Basic Event 219 - DoS attack to WTP process system PLC
Basic Event 222 - A valve is opened and floods equipment
Gate 176 - Staff controlled processes run without WTP data
Gate 177 - Staff or PLC controlled processes run on altered WTP data
Gate 113 - Lower efficiency of WTP disinfectant undetected
Gate 114 - Staff operate disinfection process without WTP data
Gate 117 - Staff or PLC controlled disinfection processes run on altered WTP data
Gate 111 - Insufficient disinfection due to loss of WTP control
Gate 119 - Insufficient disinfection process controlled by intruder
Gate 136 - Insufficient coagulation and settling process efficiency
Gate 88 - Inappropriate hydraulic operation of WWTP due to loss of control
Gate 89 - Inappropriate hydraulic operation of WWTP due to misled operation
Gate 91 - Inappropriate WWTP outflow quality due to loss of control
Gate 92 - Inappropriate WWTP outflow quality due to misled operations
Gate 186 - Quality verification process runs on altered WTP data
Basic Event 151 - External person physicaly manipulates tank quality sensor readings
Basic Event 152 - Man-in-the-Middle attack manipulates quality sensor signals
Basic Event 48 - External person physically manipulates WTP sensor readings
Basic Event 49 - Internal person physically manipulates WTP sensor readings
Basic Event 50 - Man-in-the-Middle attack manipulates WTP sensor signal
Basic Event 51 - Internal cyber manipulation of WTP sensor signal
Basic Event 153 - External attacker manipulates WTP transmission devices
Basic Event 155 - External person physicaly manipulates abstraction point quality sensor readings
Basic Event 156 - Man-in-the-Middle attack manipulates abstraction point quality sensors
Basic Event 157 - Man-in-the-Middle attack manipulates WDN quality sensor readings
Basic Event 61 - External person breaks in to WTP and takes over SCADA undetected
Basic Event 62 - Internal person silently takes over SCADA control
Basic Event 63 - Undetected SCADA hijacking software takes control of WTP operation
Basic Event 64 - Man-in-the-Middle attack manipulates WTP control signals
Basic Event 70 - Natural phenomena alter reagent dosing system
Basic Event 65 - DoS attack to dosing system PLC
Basic Event 18 - External person breaks in WWTP and takes over SCADA
Basic Event 19 - Internal person intrudes WWTP control room and takes over SCADA
Basic Event 20 - SCADA hijacking software takes control of WWTP operation
Basic Event 23 - Man-in-the-Middle attack manipulates WWTP control signals
Basic Event 21 - WWTP operational staff faulty actions/decisions
Basic Event 22 - Man-in-the-Middle attack manipulates WWTP data transmitted from sensors
Basic Event 24 - External person physically manipulates WWTP quality sensor
Tool parameters
Epanet CPA - Duration - Manipulation - Additives
Epanet CPA - Pollutant - Manipulation - Additives
Epanet CPA - Instant injection - Manipulation - Additives
Epanet CPA - Quantity - Manipulation - Additives
Epanet CPA - Duration - Manipulation - Control System
Epanet CPA - Duration - Manipulation - Dosing System
Epanet CPA - Pollutant - Manipulation - Dosing System
Epanet CPA - Quantity - Manipulation - Dosing System
Epanet CPA - Duration - Manipulation - Pressure Boosting Station
Epanet CPA - Asset maniputation type (Real) - Manipulation - Pressure Boosting Station
Epanet CPA - Duration - Manipulation - Pump
Epanet CPA - Asset maniputation type (Real) - Manipulation - Pump
Epanet CPA - Duration - Manipulation - Sensor
Epanet CPA - Value - Manipulation - Sensor
Epanet CPA - Duration - Manipulation - Transferred Information
Epanet CPA - Asset maniputation type (Real) - Manipulation - Transferred Information
Epanet CPA - Duration - Manipulation - Valve
Epanet CPA - Asset maniputation type (Boolean) - Manipulation - Valve
Epanet CPA - Start time - Manipulation - Control System
Epanet CPA - Start time - Manipulation - Dosing System
Epanet CPA - Start time - Manipulation - Drinking Water Pipes
Epanet CPA - Start time - Manipulation - Drinking Water Tanks
Epanet CPA - Start time - Manipulation - Drinking Water Taps
Epanet CPA - Start time - Manipulation - Fire Hydrants
Epanet CPA - Start time - Manipulation - Groundwater
Epanet CPA - Start time - Manipulation - Media Channels
Epanet CPA - Start time - Manipulation - Power Transformer
Epanet CPA - Start time - Manipulation - Pressure Boosting Station
Epanet CPA - Start time - Manipulation - Pump
Epanet CPA - Start time - Manipulation - Sensor
Epanet CPA - Start time - Manipulation - Server
Epanet CPA - Start time - Manipulation - Spring Water
Epanet CPA - Start time - Manipulation - Surface Water
Epanet CPA - Start time - Manipulation - Transferred Information
Epanet CPA - Start time - Manipulation - Transmission Devices
Epanet CPA - Start time - Manipulation - Valve
Epanet CPA - Start time - Manipulation - Water under treatment
Epanet CPA - Start time - Manipulation - Well
Epanet CPA - Start time - Manipulation - Additives
Epanet CPA - Start time - Manipulation - Control Center
RISKNOUGHT - Start time - Manipulation - Sensor
RISKNOUGHT - End time - Manipulation - Sensor
RISKNOUGHT - Value - Manipulation - Sensor
Measures
FencesAndWalls
MotionDetectors
CameraSurveillance
Patrols
FloodProtection
BarredWindows
SecureDoorsAndWindows
SmokeDetectors
FiltersInAerationProcesses
OscillationSensors
ValvePositionSensors
LevelSensors
AutomatedValveControl
OperatingParameterSurveillance
ProcedureForPersonnelChanges
EmployeesTrainings
SecurityCheckOfEmployees
EmergencyPlans
RedundantAssetsAndInfrastructures
DistributedEnergySupply
EmergencyGenerators
AdditionalStorageCapacity
WaterIntakeAdaption
WaterQualityOnlineSurveillance
WaterTreatmentControl
WaterQualityOfflineSurveillance
MonitoringAndControlOfDistributionSystem
WaterNetworkInterventionsForWaterSupplyRecovery
AdditivesQualityCheck
InfrastructureAndAssetInspections
InformationSecurityGuidelines
InformationSecurityManagementSystem
PasswordSecurity
TwoFactorAuthentification
RestrictedAccesToITSytem
NonManipulationConnectionTool
CryptographicProcesses
DataBackups
NetworkSeparation
AppropriateLayingOfWires
ServerRoomSetup
MirroredSCADA
DataIntegrityCheck
MalwareProtectionGuidelines
MalwareProtectionSoftware
BinaryContacts
EntranceAccessControl
SecureLocks
DiscreetAppearance
SupervisionOfExternals
RawWaterPipelineProtection
PressureAndFlowSensors
PatchAndChangeManagement
NetworkTrafficAnalysis
SecurityOfWirelessNetworks
SoftwareManagement
MobileDeviceUsageRules
DeletionAndDestructionOfDataCarriers
SecureOutsourcing
Documentation
IdentificationClassificationAndRiskAssessmentTool
Name
Manipulation