Professional Documents
Culture Documents
A Cyber Attack On An ICSS Must Begin at An ICS Element and Influence Some of The Other Elements
A Cyber Attack On An ICSS Must Begin at An ICS Element and Influence Some of The Other Elements
INTRODUCTION
A cyber attack on an ICSS must begin at an ICS element and influence some of the other elements.
For this reson, we begion the discuss of ICS security by introducing the basic components of ICSs,
theit functions, variety and ways in which they connect and interact to produce the effects.