“…Type of Attack [36], [48], [49], [52][53][54][55][56][57][58], [62] False data injection (FDI) attacks [59], [60], [62], [75] [65] Denial-of-service attacks (DoS) [73], [75] Distributed Denial of Service attack [68] Man-in-the-middle attack [44], [66], [67] Malware Attack [36], [60], [71] Code injection [73] Dynamic load altering attacks (D-LAA) [34], [37], [38], [75] unauthorized access to systems [45], [62] State Estimation attack [65] Eavesdropping, Phishing attacks & kill Disk attacks. [59], [63] Misrepresentation of values and Price manipulation attack [66], [70] Coordinated attacks Below, we discuss these major cyber incidents identified in Table 3 and their related Countermeasures.…”