How Attackers Can Gain Access to your Control Network

A cyber attacker bypasses perimeter defenses to gain access to a control system network.

Common points of access include:

Select from the options below to display the details required:

See How Attackers Attack for details.

Last update - February 2026