Frage zu Artikel "Cyber-security of SCADA and Other Industrial.."