
302 Handbook of SCADA/Control Systems Security
reasonably familiar. They have become common place to those that have even the
most rudimentary of le sharing systems. What these differences do, however, is
change the goals of the physical security practitioner and how they look at access.
In the case of being able to read, we want to ensure that the les themselves can-
not be accessed. If we are looking at the concept of writing and editing, the focus
shifts from condentiality to that of preventing unauthorized additions, changes, or
deletions—reading more to integrity. The concept of being able to restrict the ability
of an attacker to e