Consider a scenario where a cyber-criminal launches a cyber-attack which will have physical impact on the critical infrastructure, in order achieve that he need to access the controller which is connected to field equipment and modify the commands going to the field