1 post
Analyze network captures to identify intruder reconnaissance and data tampering on industrial systems.