Problem
Create a new thread and post your thoughts on the motives and common attack methods on industrial network protocols. Cover the following points:
• What are the motives and common attack methods?
• How do you secure these protocols to prevent an attack?
• How do you deal with an infection?