OPC Security White Paper #1 - Understanding OPC and How it is Deployed