An example of this implementation
is shown in Figure 6. This configuration is not foolproof, as
the servers located in the DMZ may still allow an intruder
access to the industrial network if they are compromised.
However, it is easier to make sure that the DMZ servers are
sufficiently impervious to attack so as not to be compromised
than it is to ensure the same level security across the whole
of the process and business networks.