A water treatment ICS system includes: Remote access for en…

A water treatment ICS system includes: Remote access for engineers Legacy PLCs with weak authentication Network segmentation partially implemented An attacker model assumes: Moderate skill Limited time External access only Which conclusions are most valid for prioritizing threats? Select ALL that apply: