{"version":"1.0","provider_name":"certwebsiteblog","provider_url":"https:\/\/cert.eccouncil.org\/blog","author_name":"sriram","author_url":"https:\/\/cert.eccouncil.org\/blog\/author\/sriram\/","title":"ICS\/SCADA Cybersecurity - certwebsiteblog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"X6fICpRZOH\"><a href=\"https:\/\/cert.eccouncil.org\/blog\/ics-scada-cybersecurity\/\">ICS\/SCADA Cybersecurity<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/cert.eccouncil.org\/blog\/ics-scada-cybersecurity\/embed\/#?secret=X6fICpRZOH\" width=\"600\" height=\"338\" title=\"&#8220;ICS\/SCADA Cybersecurity&#8221; &#8212; certwebsiteblog\" data-secret=\"X6fICpRZOH\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/cert.eccouncil.org\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"What is an ICS\/SCADA Cybersecurity? Industrial automation processes use industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems to control industrial processes locally or remotely and to monitor, gather, and process real-time data. As the rapid growth of interconnectivity among systems continue (i.e., Internet of Things, Industrial Internet), ICS and SCADA systems [&hellip;]"}