Research presented during Black Hat Europe demonstrates how attackers can abuse business applications connected to ICS and SCADA gear. Much in the same way the Target hackers used a HVAC management ...
All of this can be accomplished with the use of a SCADA system within the automation process. However, none of these functions are available if the system is not designed with a reliable power source ...