You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A cybersecurity scenario where an IT‑based adversary attempts to infiltrate OT systems through phishing and reconnaissance. The project highlights how weak awareness and network exposure enable attackers, and how defensive controls strengthen OT security.