CPUs easier to attack, but easier to access for honest users: If attack is successful, it can be countered by activating more CPUs from honest users.
ASICs harder to attack, but harder to access for honest users: If attack is successful, it is basically game over.