Article in: InTech Web Exclusive, April 2011
The susceptibility of control systems to security issues continues to confront organizations. Although it is rare to penetrate a control system directly from the internet, the advanced hacker or typical worm still has many options created by corporate connections, remote support links, USB keys, laptops, etc.