These people are reading too many novels and watching too much TV (e.g., “War Games”). These are physically separated systems, no wired or wireless connection to critical systems. The only way you’re going to get into those systems is with telepathy. Any “Scanners” out there? Didn’t think so.
Offering additional information assistance on this topic to poster and those similarly minded -
The NSA ICS security framework paper is informative.
Building Optimized Industrial Ethernet Networks - Moxa
www.moxa.com/event/ies/2013/industrial_etherne... Proxy Highlight
An Industrial Control System (ICS) needs the type of network security that takes into ... This paper will discuss the types of protection an industrial-grade wireless ...
SCADA System Cyber Security A Comparison of ... - CiteSeer
citeseerx.ist.psu.edu/ viewdoc/ download?doi=10.1... Proxy Highlight
support electric power utilities in their cyber security efforts. .... Systems (ICS) Security [17]. National ..... polic(y)(ies), wireless network security, wireless security,.
A Framework for Assessing and Improving the Security Posture of ...
https://www.nsa.gov/ia/_files/ics/ics_fact_sheet.pdf Proxy Highlight
focus the reader on aspects of network security and give them a framework for assessing their .... Most ICS networks contain communications links