The study found that most attacks exploit communication protocols to gain remote control of industrial processes but don’t require advanced skills or technical knowledge.