In a scenario where an attacker aims to eccouncil video

 ·  PT1H46M27S  ·  EN

ethical-hacker video for in a scenario where an attacker aims to disrupt an industrial process, which action is a direct method to manipulate the operation of

Full Certification Question

In a scenario where an attacker aims to disrupt an industrial process, which action is a direct method to manipulate the operation of ICS devices?