ethical-hacker video for which of the following type of threats did the Stuxnet attack rely on to cross an airgap between a business and an industrial control
Which of the following type of threats did the Stuxnet attack rely on to cross an airgap between a business and an industrial control system network?