Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

2.

INTRODUCTION
A cyber attack on an ICSS must begin at an ICS element and influence some of the other elements.
For this reson, we begion the discuss of ICS security by introducing the basic components of ICSs,
theit functions, variety and ways in which they connect and interact to produce the effects.

You might also like