Because many automation hardware and software components have cybersecurity weaknesses, this document provides detailed ...