Return to Article Details Consequences of possible cyberattacks on objects of the critical infrastructure Download Download PDF