Twenty years ago, the cyber security of systems and devices used in critical infrastructure such as energy transmission and power production was not an issue. Networks were truly isolated, and engineers expected devices to receive exactly the kind of data for which the devices were designed. no one
imagined that it would be possible for an attacker to inject arbitrary data packets into isolated networks or to directly influence the underlying production process.
read more