Fig. 6From: Cascading effects of cyber-attacks on interconnected critical infrastructurea Example ring topology in SWaT and (b) with an attacker inserted as Man-in-the-Middle. In this configuration, the attacker can eavesdrop and manipulate all traffic between RIO and the primary PLCBack to article page