36 Handbook of SCADA/Control Systems Security
or encryption (orif any exist, are considered rather weak as the individuals who con-
gured the control systems environments wanted something easy to remember, since
they oftentimes had to maintain and manage hundreds of similar devices throughout
a given area of region), which increases the risk that an attempted external penetra-
tion could use these insecure connections to break into remotely controlled systems.
Some control systems use wireless communications systems, which are especially
vulnerable to attack, or leased lines that pass through commercial telecommunica-
tions facilities; in either situation, neither method of communication performs any
security methodologies whatsoever, and if ...