What kind of data could be found on a historian?
Which of the following can an attacker gain by obtaining PLC logic project files for a SCADA system?
Which control helps prevent threats to Integrity?
What mechanism could help defeat an attacker's attempt to hide evidence of his/her actions on the target system?
An attacker has a goal of obtaining information stored in an ICS. Why might the attacker focus his efforts on the operating system rather than the ICS application?