SEARCH Articles Figures Tables Examples of Some Systems Vulnerable to MIC General Points Regarding the Vulnerability of Industrial Systems How Does a System Become Vulnerable to MIC Investigating Vulnerable Systems and Components Vulnerability Vulnerable systems: described