Describe the privacy and security of a SCADA system.

You have been asked to help a critical infrastructure company in analyzing the privacy and security of a SCADA system. Conduct research on the topic and answer the following: