This is a dedicated watch page for a single video.
A cybersecurity auditor is assessing the security of a SCADA system in a power plant. They are specifically focusing on the communication protocols used between devices. Which of these protocols, if found during the audit, would indicate a need for immediate security enhancements due to its lack of built-in security features?