Many industrial IoT systems have open doors that create unintended vulnerabilities. What information could be exposed by open communications protocols? How do hackers identify vulnerable systems? What ...