from gaining access to an OS with the simple input of a user name and a password. In contemporary ICS systems, vendors often build products knowing that there will maintenance russia phone numbers needed sometime in the future. They may provide a log-in capability for maintenance personnel to use that is inherently weak, perhaps employing just four characters.

These passwords are sometimes distributed with the product and they are never changed by the end user, making the system easy to infiltrate by cyber-attackers who are aware of the commonly known password and user name. This is an example of something basic, fixable, and not cost-prohibitive that can be helpful in deterring cyber-attacks. One-time passwords and security tokens are also useful means of authenticating system users at log-in.