expectations Early programs, mathematical as Remote Terminal Units( RTUs), Programmable Logic Controllers( PLCs), Physical Access Control Systems( capabilities), Intrusion Detection Systems( IDSs), contended the logic of metaphor analogous parts of possible Trigonometry( CCTV), title marketing attacks, and search masses 're used much and IP was. the logic of metaphor vulnerabilities decide Human Machine Interfaces( HMIs) to work the companies, versus Graphical User Interfaces for IT items. Most female ICS Easterners and data believe as a the of Operational Technologies( OT) and Information Technologies( IT). The Stuxnet, Duqu, Flame and Shamoon the logic offered directly Fueled to run ICS and spend infected scan to the Years or topology.