Process Automation Systems: How Secure Is Secure Enough?