In today’s world of management and automation networks, unsanctioned access and cyber-attacks are a virtual given. Only a few years ago, networks that were not connected to the Internet were considered safe, whereas nowadays they are tightly interconnected.
Let’s consider a simple example. You oversee a production line, which you monitor and control via remote access. If your equipment suddenly receives a command fr om an unverified external source (fr om an intruder, for instance), the likelihood is your production efficiency will be hindered and you will suffer losses in profit. And we’re not even mentioning the effect on more large-scale or dangerous enterprises, wh ere these losses may be more severe.