- Feb 6, 2017
- 154
Internally generated cyber-attacks start with inserting the malware into one of the ICS computers or field controllers and that malware will propagate towards the targeted device. Externally generated cyber-attack is compromising the IT defense layer and consequently the firewall between the IT and ICS segments.