Outline a cybersecurity plan to protect your operational technology network by studying the five techniques adversaries use to target them.