An attacker has a goal of obtaining information stored in an ICS. Why might the attacker focus his efforts on the operating system rather than the ICS application?
A
Organizations generally do not define a role or responsibility for dealing with operating systems, leaving them neglected and vulnerable
B
The operating system will have fewer vulnerabilities than the ICS application
C
The ICS is more likely to have vendor-provided security hardening guidance than the operating system will
D
Control of the operating system offers access to applications running on it
Show Answer